Upcoming Webcasts

On-Demand Webcasts

20/20 Webcast

GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data

x

GDPR takes a village: Practical advice to help you achieve compliance

The GDPR compliance deadline signals a big shift for organisations handling data. But it shouldn’t be about doing the bare minimum to avoid big fines. Instead, show customers your commitment by changing how your organisation uses and protects information.

Every employee has an important role to play but many don’t even realise it.

You need each person who handles, has access to, or may inadvertently see personal data to learn the basics of data protection so they can take appropriate steps when they encounter data in their work.

Join guests Enza Iannopollo, Analyst at Forrester Research and Doug Snow, VP of Customer Success, TITUS on April 20th at 2pm BST as we’ll discuss:

  • Why collaboration across the organisation is essential
  • The role of data discovery and classification to mitigate risk
  • The importance and benefits of building a culture of security
More Info

Sponsored by: TITUS

20/20 Webcast

Zero Trust Security: Never trust, always verify!

It's time to get serious about cracking down on data breaches

x

Zero Trust Security: Never trust, always verify!

Organisations spent a combined £123 billion on cybersecurity in 2016 and 2017. During the same period, 66 percent of organisations experienced and average of five or more data breaches. A larger security budget simply won’t solve the cyber security problem. An entirely new approach is required — Zero Trust Security.

The benefits of Zero Trust Security are crucially important in this climate of ever increasing number and scope of security breaches. Zero Trust Security:

  • Covers the broadest range of attack surfaces, ranging from users, endpoints, and networks to resources
  • Enables organisations to increase business agility through the secure adoption of cloud and mobile solutions
  • Provides a framework to properly manage the risk of exposing sensitive apps and infrastructure to business partners
  • Creates satisfied, productive users by ensuring the proper controls are in place to address appropriate levels of risk without requiring a heavy-handed, maximum-control approach regardless of the risk posed 

Join Barry Scott, EMEA CTO to learn more about Zero Trust, what it means for your business and how you can put it into practice.

More Info

Sponsored by: Centrify

20/20 Webcast

Is it safe? How to embrace Cloud efficiency without compromising data security

How to develop an effective and efficient digitalisation strategy

x

Is it safe? How to embrace Cloud efficiency without compromising data security

“Digital transformation” means many things to different industries, and deploying a cloud environment hosting sensitive data can appear a daunting decision to take. However, the benefits of flexibility and scalability of a cloud-based IT environment can enable organisations to embrace a more efficient way of working, with better customer engagement and experience.

Tune into this webinar, in partnership with Thales and CenturyLink, and you will learn:

  • How to develop an effective and efficient digitalisation strategy
  • Why proactive security of data can protect your reputation, employees and customers
  • How best to protect data on a cloud platform and ensure it is as secure as possible
More Info

Sponsored by: Thales e-Security

Vendor Webcast

Masterclass: how to apply security best practices to DevOps

The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need...

x

Masterclass: how to apply security best practices to DevOps

In the world of DevOps, traditional application security doesn’t cut it anymore, and relying on perimeter defences is a reactionary measure... assuming you control the perimeter. The unprecedented use of open source, speed of continuous integration and continuous delivery, containerisation, and move to the cloud all mean that teams need a new approach to application security. DevOps teams cannot cede speed and agility for the sake of security.

In this webinar, Tim Mackey explores best practices to ensure your DevOps practices stay rugged, lightning fast and secure. Attend and you'll learn:

  • New security challenges facing today’s Continuous Integration (CI) and DevOps practices, including managing open source risks with containers and traditional environments
  • Best practices for designing and incorporating an automated approach to application security into your existing development environment
  • Future development and application security challenges organisations will face and what they can do to prepare
More Info

Sponsored by: Black Duck Software

Vendor Webcast

How application security can help you stand out

Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes.

x

How application security can help you stand out

Many software vendors are now facing questions from customers asking about security practices, which can end up slowing down processes. While security risks are a constant and ongoing threat, customers want to know they’re doing business with a software vendor that has the skills and tools to address cybersecurity risks in a timely and effective manner. 

Although there are no absolute guarantees in the security space, buyers seek assurance that a software provider has the ability to deliver the best protection possible on a consistent and ongoing basis, that it’s flexible enough to address specific business and industry requirements, and that it can fix problems fast. In this webinar, we look at how to ensure that your software is created securely, with a focus on how this can be used by the go-to-market teams as a competitive differentiator.

  • How to look at your development process in order to impact security
  • How to meet your customer’s software security needs
  • How to assess software components for a holistic security standard
More Info

Sponsored by: Veracode

Vendor Webcast

Before you spend another penny on cyber-security – have you got your foundations right?

If you don't establish a solid base to build your cyber-security from, your efforts may not yield the positive results you anticipated.

x

Before you spend another penny on cyber-security – have you got your foundations right?

You wouldn’t build your house on sand, but if your expensive new IT tools are installed on shaky security foundations your organisation could be swept away in the next wave of cyber-attacks. 

Prioritise common weaknesses, ensure reliable file integrity; enable efficient change monitoring and system hardening; engage in effective vulnerability management – and don’t neglect log management. 

This webinar will show you how. And with a solid foundation in place, you can then go out and spend on the latest AI toys, safe in the knowledge you aren’t doing so without having already covered the essentials.

More Info

Sponsored by: Tripwire

Vendor Webcast

We can’t “hold on a sec”

A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake...

x

We can’t “hold on a sec”

DevSecOps means everyone is responsible for security and compliance from Day 1.

A DevSecOps culture is a must to maintain speed, agility and innovation while simultaneously meeting regulations and staying ahead of attacks. Learn how to bake it into your technology’s DNA from Day 1.

Ultimately, the challenge is to deal with imminent cloud-based attacks, whilst having visibility into processes in order to safeguard user and corporate information. This is easiest, and most scalable, under the mantra of DevSecOps. Do it from Day 1, and you won’t regret it on Day 1,000.

In this session, George will share best practice of how companies have achieved this, as well as the benefits they have realised -- and potential catastrophes they have avoided.  Some of the key takeaways will include:

  • How DevSecOps is changing how organisations approach security and compliance
  • A practitioners' guide to Securing the Cloud and Demystifying GDPR
  • How to successfully implement and maintain a DevSecOps culture
More Info

Sponsored by: Sumo Logic

20/20 Webcast

Taking charge of the GDPR

The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again.

x

Taking charge of the GDPR

The EU General Data Protection Regulation (GDPR) deadline is 25 May, 2018. If you think you’re immune from its impact, think again. In a Ponemon study, 65% of businesses are concerned about potential fines and 74% say complying with the GDPR will negatively impact their organisation1. Whether you’re ready or not, attend this webinar to find out best practices, pitfalls, and how companies like yours can achieve some quick wins in their long-term compliance strategy.

In this webinar, you will learn:

  • What’s different with the current regulations 

  • How secure digital workspaces can help

  • Scenarios organisations may encounter

1. The Need for a New IT Security Architecture: Global Study from Citrix and The Ponemon Institute

More Info

Sponsored by: Citrix

Vendor Webcast

2017 State of Cybercrime Report Webcast

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.”

x

2017 State of Cybercrime Report Webcast

One way cybercriminals obtain the resources and connections they need to engage in their activities is through the Internet underground or “dark web.” Definitions of the Internet underground may vary, but to Secureworks, it means the collection of Internet forums, digital shop fronts and chat rooms that cybercriminals use to form alliances, trade tools and techniques, and sell compromised data that can include banking details, personally identifiable information and other content.

In our “2017 State of Cybercrime” report, we shared several key findings and intelligence which stems from the visibility gained from criminal forum monitoring, our thousands of clients, the machine learning and automation from our industry-leading Counter Threat Platform™, and the actionable insights from our team of elite Counter Threat Unit™ (CTU) researchers, analysts and consultants.

Secureworks Counter Threat Unit Senior Security Researcher, Mike McLellan, will analyse the key findings from our research and will cover recommended strategies for organisations to pursue in order to prevent, detect, respond to and predict the latest cybercriminal activity threats.

During this live webcast we will cover:

  • Key findings from our visibility into criminal forums and technical monitoring of global criminal activity
  • Cybercrime categories and the significant risk to individuals and organisations
  • The complexity of the criminal landscape and diverse capabilities of threat actors
  • The continuation of online crime as a market economy
More Info

Sponsored by: SecureWorks

Vendor Webcast

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according...

x

Identifying the Unknown: Spotting Malicious Activity When Everything Else Fails

It is no exaggeration that enterprises can run on average 25 security products concurrently, as it is the case with financial services organisations, according to research firm Ovum. And yet sometimes, 25 products can be as good as zero.

Organisations can suffer from a false sense of security thinking they’re better protected than organisations running fewer security products. But in fact, it could be quite the opposite. Much like the law of diminishing returns, the more products, the more alerts, and the more alerts, the higher your chances are of wasting time investigating the same threat more than once—keeping you from focusing on other, more critical threats.

Join Golan Ben-Oni, Global Chief Information Officer at IDT Corporation, and Gil Barak, Co-Founder and Chief Technology Officer at Secdo, as they show you how alerts can be streamlined to simplify threat hunting and find what would have otherwise been overlooked by other tools. Attendees will learn:

  • What is threat-level visibility and how it gives you a far more granular view into potential threats than user-level or kernel-level access to endpoint activity ever could
  • What steps can be taken to automate and simplify alert analysis to eliminate time spent chasing down redundant alerts and false positives
  • How to optimise your security workflow following an incident
More Info

Sponsored by: Secdo

Vendor Webcast

Simplify PKI Certificate Management or Best Practice Certificate Management

You’re facing critical challenges in your digital business deployment. You must protect the enterprise by safeguarding your devices, networks and data. But you...

x

Simplify PKI Certificate Management or Best Practice Certificate Management

You’re facing critical challenges in your digital business deployment. You must protect the enterprise by safeguarding your devices, networks and data. But you also need to move quickly and fearlessly in order to compete.

PKI is the critical underpinning to help organisations succeed as they roll out new digital business models. But, as Gartner noted in its recent report, “PKI is Gearing Up for the Internet of Things” (August, 2016), certificate management is the issue for which clients seek the most guidance, and it is becoming increasingly important.

This webinar discusses:

  • Elements that make up good certificate management
  • Defining assurance levels
  • Manual vs automated certificate management
  • Certificate discovery & migration

Join us to discover how best practice certificate management can help you simplify and streamline your PKI implementation and build a better approach to manage trust and accelerate your digital business.

More Info

Sponsored by: Entrust

Vendor Webcast

Ever Changing Endpoint Security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand...

x

Ever Changing Endpoint Security

It seems that no matter what we do, there will always be a new strain of malware designed to give CISOs grief. It might be called Wanna Cry, Pytra or any of thousand different names but malware keeps evolving for a simple reason — it works. Today’s 20/20 looks at why malware works, why many of the common-sense defenses don’t and what CISOs should do about it.
More Info

Sponsored by: McAfee

Vendor Webcast

Rethink Security to Follow Identity

Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default...

x

Rethink Security to Follow Identity

Last year, over $80 billion was spent on cyber security, yet two-thirds of organisations were still breached. The reason? 81% of data breaches involved weak, default or stolen passwords.

Watch this webinar to learn why current threats and today’s hybrid IT environment require changes to old security models and how Identity Services defends your organisation against the most common cyber attacks.

We’ll examine:

  • The current (broken) state of security and the role identity plays in cyberattacks
  • The massive rethink under way that redefines security to follow identity
  • How Identity Services reduce the risk of breaches by over 50%
  • How Verizon and Centrify uniquely help reduce risk through the power of identity services.
  • *Verizon DBIR 2017
More Info

Sponsored by: Centrify

Vendor Webcast

Is your email system offering an easy route into your network for ransomware?

Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering via email. How can you close this backdoor...

x

Is your email system offering an easy route into your network for ransomware?

Your email system is usually your weakest point of entry for ransomware attackers with 98% of phishing malware entering  via email.  How can you close this backdoor to your systems and avoid becoming a victim?  Listen to our webinar to identify your weakspots –and discover how to strengthen them.

Steven Malone is Director of Product Management for security services at Mimecast.

Having joined Mimecast in 2013, he is responsible for defining and bringing the security product roadmap from vision to reality.  Steve works closely with the all areas of the organisation to bring new security products and service innovations to our customers.

Steve is a passionate advocate for security in technology. Prior to joining Mimecast, he held senior roles in the security channel and also technical positions in a number of global organisations.

Please click here to register

2pm BST, Thursday 7 September 2017

More Info

Sponsored by: Mimecast

Vendor Webcast

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

There is a data storm coming your way, make sure you are prepared for the storm!

x

Dealing with the Storm – The U.K.’s 2017 Data Threat Landscape

Enterprises in U.K. are experiencing a storm of global proportions around their data – It starts with a growing need for data to power business growth, and expands with strict regulatory requirements, advanced technology deployments and escalating cyber-attacks – and it’s putting their data at risk.

In this webinar we’ll look deeply into the results for the 5th annual 2017 Thales Data Threat report, with a focus on the results for the U.K. and comparisons against global competitors.  Learn both about the threats, but also about what enterprises are doing about them – and best practice recommendations from IT security analysts at 451 Research.

  • How data breaches keep growing in spite of increased IT security spend – and what some of the reasons for that trend are
  • How advanced technologies such as Containers, IoT, Big Data and Cloud change the required approach to protecting critical and sensitive information
  • How new data privacy regulations are shaping enterprise plans for data security
  • What barriers enterprises encounter to deploying and using data security tools – and how to overcome them

 

More Info

Sponsored by: Thales e-Security

Vendor Webcast

Your GDPR Plan: 4 Steps to Bolster Security & Meet Compliance

GDPR will impact both your organisation and the way you think about its security but where do you start?

x

Your GDPR Plan: 4 Steps to Bolster Security & Meet Compliance

25th May, 2018, will mark the enforcement of the first comprehensive overhaul of European data protection legislation in over twenty years. The critical date is looming ever closer, and the amount of attention on the General Data Protection Regulation and speculation over whether some of the world’s largest organisations will meet the deadline is growing rapidly. And deservedly so, it’s a big deal. Ultimately, the GDPR will impact both your organisation and the way you think about its security.  But where do you start?  What should organisations be doing to ensure that they are taking positive steps towards compliance, but also generating enough urgency internally to be able to achieve this goal? Join Hadi Hosn, Head of Security Strategy and GRC Consulting and Resident GDPR Practitioner in EMEA for SecureWorks, as he reviews the GDPR basics, what they mean for your business, and the steps you can be taking now on your journey to compliance. Whether you are just starting to think about GDPR, looking for help on where to go next, or raising awareness and reinforcing the importance of the GDPR in your organisation, this webcast is for you. In this webcast you will learn:
  • GDPR basics – what you need to know
  • What the regulation means for businesses
  • The SecureWorks point of view
  • The SecureWorks approach to achieving GDPR Compliance
  • More Info

    Sponsored by: SecureWorks

    Vendor Webcast

    Using Augmented Intelligence to address the human element

    So how do you spot a criminal operating on your network with legitimate credentials, and avoid blaming innocent staff – or catch the malicious staffer gone bad?...

    x

    Using Augmented Intelligence to address the human element

    Today’s information-rich enterprise needs a 360 view of its data, under 24 hour analysis to spot anomalies and actions that contravene agreed policies and behaviours - in essence the who, what, when and where of your critical data.
     
    And when it comes to the ‘who’, you need to identify and address the human element in your network security to safeguard your organisation, its customers and your staff.
     
    So how do you spot a criminal operating on your network with legitimate credentials, and avoid blaming innocent staff – or catch the malicious staffer gone bad?  
     
    By using augmented intelligence to leverage brain power with processing power, combining human experience with machine powered pattern recognition in big data to multiply the results achieved by your best staff.
    More Info

    Sponsored by: ZoneFox