More Protective Security Content – Page 4
-
FeatureMeet the expert: Luke O’Brien to speak at PrivSec London
We are very happy to announce that easyJet Cyber Security Chief Luke O’Brien will be speaking at PrivSec London, next week.
-
FeatureMeet the expert: Kristian Alsing to speak at PrivSec London
We are delighted to reveal that Senior Cyber Security and Business Resilience Executive, Kristian Alsing will be speaking at PrivSec London, opening next week.
-
FeatureMeet the expert: Paul Bedford to speak at PrivSec London
We are very happy to announce that Information and Cybersecurity Risk expert, Paul Bedford will be speaking at PrivSec London, opening at the end of this month.
-
FeatureMeet the expert: Daniel Garcia to speak at PrivSec London
We are very happy to announce that GRC and Fintech evangelist Daniel Garcia will be speaking at PrivSec London, opening at the end of this month.
-
FeatureTen Key Considerations to Prevent or Mitigate a Ransomware Attack
If ransomware hits, will you pay the attackers? As tempting as it might be, there are many reasons not to pay.
-
TrainingISO/IEC 27001:2022 and ISO/IEC 27002:2022, and how they affect your organisation
ISO/IEC 27001:2022 is the newest iteration of the international standard that sets out the specifications for an ISMS (information security management system).
-
FeatureCyberRes: Privacy begins with data discovery
How to find, protect, and secure your sensitive and high-value data
-
FeatureNew NIST Report: Integrating Cybersecurity Into Enterprise Risk Management
With cyberattacks becoming more devastating and complex, cybersecurity is at the forefront of public and government attention.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
WebinarThe Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
VideoKeeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
VideoThe human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
VideoChoosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
FeatureKey Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
FeatureLooking Ahead: The Landscape of Data Privacy Legislation in 2022
Throughout the world several countries have begun to take a stronger approach to data privacy and security by enacting legislation pertaining to digital marketing and what organizations must do to ensure that consumer data is protected.
-
SponsoredDefining trust for your organization, as a human trait, and within information security with Matthew Moog from OneTrust
Matthew Moog serves as the General Manager, Third-Party Risk at OneTrust, the category-defining enterprise platform to operationalize trust.


