Join BrightTALK’s upcoming virtual summit for a global four-day online event. Register for free thought leadership from the world’s top speakers, vendors and evangelists in the form of live webinars, panel discussions, keynote presentations, and webcam videos.
Securing the Endpoint
Learn how to keep track of, manage and secure your endpoints in the age of remote working.
Addressing the Insider Threat
Understand user behavior and leverage the tools available to detect and prevent anomalous and malicious activity from inside your organization.
Network Monitoring & Asset Management
Explore solutions and best practices for monitoring your networks, users and devices.
Network Security for the SMB
Discover how SMBs can better manage their security and protect their business from cyber attacks.
Cyber attackers hidden in plain sight
In recent times, dealing with insider threats has become one of the critical aspects of protecting IT assets of any organization. Traditional security measures tend to focus on external threats and are not necessarily capable of identifying an internal threat. As a result, when it comes to data breaches, around 50% of…
Successful techniques for cybersecurity awareness
Most security awareness training fails. Typically, it’s boring, condescending or wrong, and sometimes all three. This webinar has a different approach: calling on principles from sales and marketing, ethical hacking, education theory and creative writing. Learn how your awareness training can generate empathy, tension and emotional investment, enticing your audience to keep…
Human-Centred Security: Effectively managing behaviour
On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF will be discussing Human-Centred Security and how to effectively manage behaviour. In this session we will be addressing: – The vulnerabilities in human behaviour that make them susceptible to manipulation – The key factors that influence security…
Effectively Automating Your Detection & Response Program
Traditional detection and response deployments are expensive and ineffective. Today’s security operations teams are lean and often under-resourced, contending with multiple, disparate security tools that tend to be poorly integrated, if at all. Security analysts are bogged down by excess alerts and time-consuming, repetitive, and manual processes. By implementing intelligent automation for…
Security on a Shoestring
It is now widely known that SMBs are a key target for cyber criminals. They are now seen as the ‘low hanging fruit’ as SMBs generally cannot afford the same investment in cyber security initiatives when compared to larger firms. Unfortunately, as far as the cyber criminals are concerned, anyone on the…
Special thank you to our Sponsors!
By sponsoring an online summit your brand can be seen by thousands of targeted, engaged professionals
Partner, Cyber Security and Privacy Risk Services
RSM Australia Pty Ltd.
Quick Heal Technologies Ltd.
Naturally Cyber LLP