Webinars Archives - IT Security Guru https://www.itsecurityguru.org/category/events/webinars/ The Site for our Community Thu, 07 Apr 2022 18:57:12 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png Webinars Archives - IT Security Guru https://www.itsecurityguru.org/category/events/webinars/ 32 32 Webinar: Secure Your Cloud Environment from Evolving Threats https://www.itsecurityguru.org/2022/04/07/secure-your-cloud-environment/?utm_source=rss&utm_medium=rss&utm_campaign=secure-your-cloud-environment Thu, 07 Apr 2022 18:56:11 +0000 https://www.itsecurityguru.org/?p=44953 The IT Security Guru has teamed up with Synopsys, a recognised leader in application security, to bring you the webinar, ‘Secure Your Cloud Environment from Evolving Threats‘. As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data breaches, misconfiguration risks, weak […]

The post Webinar: Secure Your Cloud Environment from Evolving Threats appeared first on IT Security Guru.

]]>
The IT Security Guru has teamed up with Synopsys, a recognised leader in application security, to bring you the webinar, Secure Your Cloud Environment from Evolving Threats.

As the migration to the cloud continues at an unabated pace, the threats in the cloud are also increasing proportionally and evolving constantly. Data breaches, misconfiguration risks, weak identity and access management controls, insider threats, multi-cloud infrastructure, and increasing complexity are just a few of the many challenges that are common in cloud computing.

Adding to the complexity of today’s cloud landscape are multiple cloud providers with different ecosystems and myriad services offering unique security controls. Migrating on-premises/private cloud IT infrastructures onto the public cloud only increases the challenge of ensuring cloud security.

In this webinar, learn the essential elements required to ensure the security of your cloud environments.

  • Setting the right cloud security strategy that suits your organisation
  • Deploying and operating cloud-based applications with adequate security controls in a secure infrastructure
  • Ensuring container-level security
  • Maintaining a good cloud security posture

In addition, hear success stories of how Synopsys helped tackle some clients’ cloud security challenges.

The webinar will be live online at 11.30 am BST on the 28th of April 2022 and henceforth, available on demand.

Don’t miss out! Register HERE

 

The post Webinar: Secure Your Cloud Environment from Evolving Threats appeared first on IT Security Guru.

]]>
Cybersecurity Investment: Supporting SME decision making https://www.itsecurityguru.org/2021/09/15/cybersecurity-investment-supporting-sme-decision-making/?utm_source=rss&utm_medium=rss&utm_campaign=cybersecurity-investment-supporting-sme-decision-making Wed, 15 Sep 2021 14:33:57 +0000 https://www.itsecurityguru.org/?p=42683 Small businesses (SMEs) form the backbone of the digital economy so it’s crucial that they can make the right kinds of security investments to protect themselves from cyber attacks. However, the various frameworks to guide security investments are often too costly and difficult for SMEs to implement, and the potential of insurance and its financial […]

The post Cybersecurity Investment: Supporting SME decision making appeared first on IT Security Guru.

]]>
Small businesses (SMEs) form the backbone of the digital economy so it’s crucial that they can make the right kinds of security investments to protect themselves from cyber attacks.

However, the various frameworks to guide security investments are often too costly and difficult for SMEs to implement, and the potential of insurance and its financial incentives for cybersecurity has yet to be fully realised.

Consequently, the National Cybersecurity Centre (NSCS) and the Research Institute in Sociotechnical Cyber Security have supported year-long projects to explore how to tackle these challenges.

During this webinar, lead researchers of these projects will present their findings, and industry experts will also share their insights based on their experience of working with SMEs. The webinar will share practical advice and make original proposals to improve cybersecurity for SMEs.

Speakers include:

– Dr Yulia Cherdantseva, Lecturer in Cybersecurity, Cardiff University: Cybersecurity investment decision making: a best practice guide for SMEs

– Dr Jason Nurse, Senior Lecturer in Cybersecurity, Kent University: Cybersecurity incentives and the role of cyber insurance

– James Tootell, Investment Director, EOS Venture Partners

Be sure to tune in on Thursday, the 23rd of September at 10am BST! You can register via the following link: https://zoom.us/webinar/register/WN_oiG8dJVXStqM9dpmrwgnqA

The post Cybersecurity Investment: Supporting SME decision making appeared first on IT Security Guru.

]]>
Password Security – Now’s the time to get serious https://www.itsecurityguru.org/2021/09/07/password-security-nows-the-time-to-get-serious/?utm_source=rss&utm_medium=rss&utm_campaign=password-security-nows-the-time-to-get-serious Tue, 07 Sep 2021 02:30:31 +0000 https://www.itsecurityguru.org/?p=41252 Did you know that over 80% of breaches involve brute force or lost and stolen credentials, and that over 70% of employees reuse passwords at work? Passwords are on your first line of defence against cyber-attacks and won’t be going away any time soon, getting this piece of the puzzle correct is foundational for cyber defence, the protection […]

The post Password Security – Now’s the time to get serious appeared first on IT Security Guru.

]]>
Did you know that over 80% of breaches involve brute force or lost and stolen credentials, and that over 70% of employees reuse passwords at work? Passwords are on your first line of defence against cyber-attacks and won’t be going away any time soon, getting this piece of the puzzle correct is foundational for cyber defence, the protection of your business and its data.

Live Demo: Supercharge Your Active Directory Password Policy

Join us for a 30-minute live demo of Specops Password Policy focusing on blocking weak passwords and creating compliant password policies.

Darren James, Technical lead at Specops will demonstrate how to:

  • Block weak passwords and create a password dictionary containing potential passwords relevant to your organisation
  • Apply Breached Password Protection to check against the latest leaked lists, including more than 2.5 billion leaked passwords.
  • Create compliant password policies and simplify passwords for users
  • Target password entropy and help users create stronger passwords in Active Directory

WATCH HERE!

 

Darren James – Technical Lead at Specops Software:

Darren has over 25 years of experience in IT, having worked as a consultant across many sectors and many different sizes of organizations from central/local governments, to retail and energy companies. He specializes in IT Security, Active Directory, Azure AD, and Group Policy.

He has worked at Specops for nearly 10 years and he’s been loving every minute!

The post Password Security – Now’s the time to get serious appeared first on IT Security Guru.

]]>
How to Smartly Scale AppSec Testing https://www.itsecurityguru.org/2021/09/03/how-to-smartly-scale-appsec-testing/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-smartly-scale-appsec-testing Fri, 03 Sep 2021 14:50:13 +0000 https://www.itsecurityguru.org/?p=42621 The IT Security Guru has paired up with Synopsys, a recognised leader in application security, to bring you the webinar, ‘How to Smartly Scale AppSec Testing’. No matter what any blog or vendor says you know there is no silver bullet for application security. Complete one item on your to-do list, seven more things are […]

The post How to Smartly Scale AppSec Testing appeared first on IT Security Guru.

]]>
The IT Security Guru has paired up with Synopsys, a recognised leader in application security, to bring you the webinar, ‘How to Smartly Scale AppSec Testing’.

No matter what any blog or vendor says you know there is no silver bullet for application security. Complete one item on your to-do list, seven more things are there anxiously awaiting your attention. Since cloning yourself is out of the question, how are you scaling your AppSec program to keep up?

Join Khalid Damran, Head of Information Security Risk Department at the Bank of Palestine, and Frank Morris, Managing Director of Synopsys as they discuss how overwhelmed or understaffed organisations are scaling their AppSec testing. Topics covered include:

  • How to handle elasticity in testing demand in a global skills shortage
  • What happens when we share knowledge and experience more often
  • Why feedback and continuous improvement matters

The webinar will be live online at 10am BST on the 29th of September and henceforth, available on demand.

Don’t miss out – register HERE now!

 

The post How to Smartly Scale AppSec Testing appeared first on IT Security Guru.

]]>
Leveraging Automation to Secure Your Remote & Hybrid Workforce https://www.itsecurityguru.org/2021/03/10/leveraging-automation-to-secure-your-remote-hybrid-workforce/?utm_source=rss&utm_medium=rss&utm_campaign=leveraging-automation-to-secure-your-remote-hybrid-workforce Wed, 10 Mar 2021 17:19:57 +0000 https://www.itsecurityguru.org/?p=40500 Adopting end-to-end security automation is a top priority for many organisations, and the rapid shift to remote work due to the COVID-19 pandemic has forced many businesses to accelerate their Digital Transformation strategy. Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, IT and […]

The post Leveraging Automation to Secure Your Remote & Hybrid Workforce appeared first on IT Security Guru.

]]>
Adopting end-to-end security automation is a top priority for many organisations, and the rapid shift to remote work due to the COVID-19 pandemic has forced many businesses to accelerate their Digital Transformation strategy. Faced with the challenge of managing identities and securing access to data and applications from a growing number of endpoints, IT and security teams need to leverage Risk and IAM Automation to maintain business continuity and secure their remote and hybrid workforce.

Join Stuart Sharp – VP of Technical Services, OneLogin – and Dan Raywood – cybersecurity journalist – for a discussion on:

  • The security challenges many organisations face when transitioning their staff to remote work
  • How Risk and Access Management automation can help organisations build a security framework as they work remotely and when they return to the office
  • How automation can increase security and improves the user experience
  • Why Identity and Access Management automation is a critical objective in a Digital Transformation strategy

Attendees at the session will learn:

  • What benefits can adopting automation bring?
  • How can you automate IAM, and what benefits does it bring to your business?
  • What security advances can automation bring, and how does IAM sit among those benefits?

WATCH HERE!

 

Stuart Sharp – VP of Technical Services, OneLogin:

Stuart heads up the Technical Services organization at OneLogin, helping customers address today’s Identity and Security challenges through the cloud-based OneLogin Trusted Experience Platform. During a career spanning more than 25 years, Stuart has had a passion for driving technical innovation, with a particular focus on Data Security, Cloud Encryption and Identity and Access Management. Before joining OneLogin, Stuart has worked for an Oxford University high-tech spin-off, as Global Product Management for Database Security at Oracle, and as VP of Solution Engineering for CASB provider CipherCloud. Stuart earned his BA at Harvard University, and MPhil at Oxford University.

The post Leveraging Automation to Secure Your Remote & Hybrid Workforce appeared first on IT Security Guru.

]]>
Post-Pandemic Healthcare: the greatest challenges facing cyber professionals https://www.itsecurityguru.org/2021/02/05/post-pandemic-healthcare-the-greatest-challenges-facing-cyber-professionals/?utm_source=rss&utm_medium=rss&utm_campaign=post-pandemic-healthcare-the-greatest-challenges-facing-cyber-professionals Fri, 05 Feb 2021 15:25:30 +0000 https://www.itsecurityguru.org/?p=40051 Ransomware attacks and nation-state assaults on vaccine supply chains are only two of the many challenges healthcare cyber professionals have been hit with as a result of COVID-19. How were these challenges overcome? More importantly, though, what challenges are healthcare cyber professionals facing in a post-Pandemic world? The Israeli Economic and trade Missions in London […]

The post Post-Pandemic Healthcare: the greatest challenges facing cyber professionals appeared first on IT Security Guru.

]]>
Ransomware attacks and nation-state assaults on vaccine supply chains are only two of the many challenges healthcare cyber professionals have been hit with as a result of COVID-19. How were these challenges overcome? More importantly, though, what challenges are healthcare cyber professionals facing in a post-Pandemic world?

The Israeli Economic and trade Missions in London and Washington, DC have teamed up to launch a cybersecurity panel focusing on exactly that: “Post-Pandemic Healthcare: Greatest challenges facing cyber professionals”.

On February 10th at 10 AM US EST and 15:00 GMT, Dr. Saif Abed, leading voice in both Cybersecurity and Healthcare, will moderate an insightful panel of Isreali experts in the cybersecurity and healthcare field.

The panel will address these specific key areas of healthcare in cyber:

  • Ransomware – how to defeat this scourge of hospitals everywhere?
  • Medical IoT – what risks exist with connected medical devices?
  • APIs – what happens when consumers and external parties connect to your network?
  • Governance, Risk Management, and Compliance (GRC) – what’s the future of governance and data protection in the healthcare industry?

You can register here and join in on the conversation.

 

 

The post Post-Pandemic Healthcare: the greatest challenges facing cyber professionals appeared first on IT Security Guru.

]]>
Webinar: Cyber Criminals Leave Their Fingerprints on the Internet Too https://www.itsecurityguru.org/2020/11/03/webinar-cyber-criminals-leave-their-fingerprints-on-the-internet-too/?utm_source=rss&utm_medium=rss&utm_campaign=webinar-cyber-criminals-leave-their-fingerprints-on-the-internet-too Tue, 03 Nov 2020 11:24:50 +0000 https://www.itsecurityguru.org/?p=38763 2020 is a year where it is impossible for us to ignore the extent to which we exist online. However, while the legal economy has moved online, there has been a thriving illegal economy online for years. Oliver Tonge, cyber security consultant at DomainTools discusses in this webinar how threat actors are operating online, and […]

The post Webinar: Cyber Criminals Leave Their Fingerprints on the Internet Too appeared first on IT Security Guru.

]]>
2020 is a year where it is impossible for us to ignore the extent to which we exist online. However, while the legal economy has moved online, there has been a thriving illegal economy online for years. Oliver Tonge, cyber security consultant at DomainTools discusses in this webinar how threat actors are operating online, and how those seeking to keep us safe from criminality online can trace their movements across the Internet.

Click here to view the Webinar

The post Webinar: Cyber Criminals Leave Their Fingerprints on the Internet Too appeared first on IT Security Guru.

]]>
Manipulation by Disinformation: How Elections are Swayed https://www.itsecurityguru.org/2020/10/28/manipulation-by-disinformation-how-elections-are-swayed/?utm_source=rss&utm_medium=rss&utm_campaign=manipulation-by-disinformation-how-elections-are-swayed Wed, 28 Oct 2020 10:42:21 +0000 https://www.itsecurityguru.org/?p=38649 In 2016, we witnessed as the Trump and Brexit campaigns leveraged the help of Cambridge Analytica to spread disinformation and sway voters in their favour. While Cambridge Analytica has since been dissolved, the threat of disinformation is ever-present. In many ways, it is a threat that arguably dates back to ancient times and what we […]

The post Manipulation by Disinformation: How Elections are Swayed appeared first on IT Security Guru.

]]>
In 2016, we witnessed as the Trump and Brexit campaigns leveraged the help of Cambridge Analytica to spread disinformation and sway voters in their favour. While Cambridge Analytica has since been dissolved, the threat of disinformation is ever-present. In many ways, it is a threat that arguably dates back to ancient times and what we see today is simply its amplification on a global scale.

We invited a number of special guests to compare and contrast how propaganda has evolved over the years, looking specifically into how social media has changed the game. Where Rupert Murdoch has had majority ownership of the media, has the advent of social media made electoral campaigns fairer by offering others a voice? Or has it, in fact, become an effective tool for manipulation? What about social media platforms as the gatekeepers? Is it their responsibility to fend off “fake news”? If not, whose responsibility is it?

With the world watching in anticipation as US citizens vote in their 46th president, this will no doubt be a fascinating and relevant conversation to listen in on.

Manipulation by Disinformation

Panellists:

– Jenny Radcliffe, aka The People Hacker, Human Factor Security

– Rosa Smothers, Senior VP of Cyber Operations at KnowBe4 and former CIA threat analyst

– Prof. Danny Dresner, Academic Cyber Security Lead at University of Manchester

– Chad Anderson, senior security researcher at DomainTools

Chair:

– Tony Morbin, editor of IT Security Guru and former editor of SC Magazine

The post Manipulation by Disinformation: How Elections are Swayed appeared first on IT Security Guru.

]]>
Webinar: Enable Employees to be the First Line of Defence https://www.itsecurityguru.org/2020/10/21/webinar-enable-employees-to-be-the-first-line-of-defence/?utm_source=rss&utm_medium=rss&utm_campaign=webinar-enable-employees-to-be-the-first-line-of-defence Wed, 21 Oct 2020 14:53:42 +0000 https://www.itsecurityguru.org/?p=38528 Our editor, Tony Morbin, sits down with an experienced panel of cybersecurity professionals to discuss how to stay ahead of cybercriminals Often, employees get a bad rep when it comes to cybersecurity as they are often branded as the “weakest link in the cyber chain”. However, Ran Puchag, Chief Product and Development Officer firmly believes […]

The post Webinar: Enable Employees to be the First Line of Defence appeared first on IT Security Guru.

]]>
Our editor, Tony Morbin, sits down with an experienced panel of cybersecurity professionals to discuss how to stay ahead of cybercriminals

Often, employees get a bad rep when it comes to cybersecurity as they are often branded as the “weakest link in the cyber chain”. However, Ran Puchag, Chief Product and Development Officer firmly believes that employees can actually contribute to a better security posture overall, and he is not alone! Throughout this panel discussion, the overarching theme is that with the right training and provision, employees can actually be the first line of defence against malicious threat.

What do these processes look like? How might a business convert their employees from a security threat to their greatest asset? Find out for yourself in our free webinar.

 Ava Security Webinar Panel discussion promo

Click here to watch!

The post Webinar: Enable Employees to be the First Line of Defence appeared first on IT Security Guru.

]]>
Webinar: The Challenges of Diversity within the Cybersecurity Industry https://www.itsecurityguru.org/2020/10/08/the-challenges-of-diversity-within-the-cybersecurity-industry/?utm_source=rss&utm_medium=rss&utm_campaign=the-challenges-of-diversity-within-the-cybersecurity-industry Thu, 08 Oct 2020 14:00:03 +0000 https://www.itsecurityguru.org/?p=38311 Diversity is an ongoing priority—and challenge—for many organisations, especially in the technology space. Research has proven that diversity on a team brings unique benefits, including new perspectives and innovative solutions. These, in turn, contribute to a stronger overall company. And yet, in many companies around the world, achieving a diverse workforce is still more aspiration […]

The post Webinar: The Challenges of Diversity within the Cybersecurity Industry appeared first on IT Security Guru.

]]>
Diversity is an ongoing priority—and challenge—for many organisations, especially in the technology space. Research has proven that diversity on a team brings unique benefits, including new perspectives and innovative solutions. These, in turn, contribute to a stronger overall company. And yet, in many companies around the world, achieving a diverse workforce is still more aspiration than reality. For instance, despite having International Women’s Day and conversations around gender and sexual-orientation diversity, women and LGBTQ+ individuals remain underrepresented in most companies.

This webinar focuses on the challenges of diversity within the cybersecurity industry, and what steps companies can take to overcome them. This boils down to recruiting more women, LGBTQ+ individuals, and minorities in terms of race, religion, ethnicity, and even age. Level pay, investing in diverse talent, and empowering voices within a company’s culture all play important roles, as well.

Join us here for this vital webinar to learn how you can promote opportunity for all in your organisation.

The post Webinar: The Challenges of Diversity within the Cybersecurity Industry appeared first on IT Security Guru.

]]>