Latest Resources – Page 4
-
Video
How easy is it to phish your business?
As cybersecurity and cyberthreats become more prevalent in our personal and working lives, businesses have invested in solutions like antivirus software and endpoint protection to try and secure their employees, data and intellectual property.
-
Video
Spotting the signs of insider risk – and stopping a security incident before it happens
When it comes to cybersecurity and the risks that go alongside it, we know that people aren’t perfect – they get hacked, they make mistakes, and they also break the rules.
-
Video
Phishing The Growing Threat to your Business
The remote working revolution has led to an increased threat from phishing. It is thought that around three-quarters of all companies have suffered some sort of phishing campaign in the past year.
-
Video
Artificial Intelligence/Machine Learning: How Can AI lead to a New Revolution in Cybersecurity
Artificial Intelligence and Machine Learning have radically affected the ways in which we work; within cybersecurity this is fascinating, as it will affect the ways in which cybercriminals operate as much as how security teams can evolve.
-
Video
Ransomware is not out of control, it is everything from cryptocurrencies to users
This panel will explore a controversial topic: what is more out of control at the moment, ransomware attacks or our susceptibility due to outside forces such as cryptocurrencies and the very users/staff of our companies?
-
Video
Ransomware Hacks: Are You and Your Vendors Vulnerable?
In recent months, supply chain attacks have made headlines and wreaked havoc across businesses. These attacks, which often use ransomware, can impact thousands of organizations by targeting a single company.
-
Video
Insider/Internal Threats: Why Boards Should Never Take This for Granted
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cybersecurity threats to consider.
-
Video
Speaking Different Languages: What Data Protection & Privacy and Security departments have to learn about each other
Whether it be the coalescing of both security and privacy in the CISO office, or questions about where a Privacy Office fits and whether it incorporates Risk, Legal, Compliance and Engineering, there are so many things that Data Protection/Privacy and Security offices can learn from each other as they look to come out of their silos and work together more closely to support their organisations.
-
Video
Emerging Challenges in Cybersecurity: Lessons Learned and Actionable Steps to Protect Your Organization
SolarWinds had many high-profile clients, deeply affected by the hack; this has been followed by other hacks in 2021 such as the Colonial Pipeline, Microsoft Exchange server, Facebook, Air India and more.
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
ebook
The Complete Guide to Business Privacy
Your Organization’s Greatest Responsibility & Opportunity
-
ebook
Managing Security for a Hybrid Workforce
A Guide to Ensuring Email and File Protection Across Platforms
-
Podcast
Microsoft Podcast: Manage risk with intelligent data protection and compliance solutions
During this podcast, our subject matter experts will discuss the biggest concerns for today’s CIOs, CISOs and DPOs and they will explore the best ways to protect data, mitigate risk, and address compliance regulations in this new reality.
-
Video
GRC TV: Securing Digital Transformation & Security Threats
Access this episode on demand, as we delve into on the current landscape of cyber security with Ciaran Martin, plus how to secure your digital transformation with strong security.
-
Webinar
Do You Know What Your Ransomware Readiness Score Is?
It’s not a matter of if, but when. Ransomware incidents are on the rise and it is crippling companies. But there are key things you can and should be doing to prevent and recover in the event of a ransomware attack.
-
Video
GRCTV: The cyber fraud epidemic & app store scams
Access this episode on demand, as we delve into how the pandemic created a cyber fraud epidemic and we chat with the man poking holes in Apple’s app store and the multi-million dollar scams operating on within the app store.
-
Video
GRCTV: How to succeed as a security leader & the top security considerations in a digital nomad era
Access this episode on demand, as we explored how to succeed as a security leader and also look at the top security considerations in a digital nomad era.
-
ebook
Has O365 closed the door to data leaks?
Efficiency, collaboration and security are often the positive messages in regards to implementing Office365 in any organisation. But, is your organisation truly experiencing the comfort of safe communication?
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.