Breaking the Myth of Identity and Access in the Cloud - Expert Opinion
Question, can you solve the ongoing challenge of keeping users connected and productive in spite of the risk that every new cloud app and remote access request poses? The question isn't over.
Can you do this seamlessly and quickly?
Can you automate it?
Can you monitor for early signs of malicious user-account behaviour?
Cloud Apps are amazing. They just work. Users love them and use them (mostly without telling the business). The challenge is that protecting your organisations high-value assets against attack and exploitation is critical.
This threat isn’t' going anywhere. You have to be able to efficiently, seamlessly and granularly manage all user identities and what they access. Oh - wait. You also need to give users 'user-friendly' methods of accessing their 50 cloud-apps. All of this and much more is possible.
RecordedMay 12 202046 mins
Your place is confirmed, we'll send you email reminders
Join us on the 11th May at 10:00am as we discuss the importance of Mobile Security within your organisations. We will be joined by our CTO, Phil Howe and Lookout's Senior Sales Engineer.
Over the past decade, technology enthusiasts have dreamed about smartphones and tablets taking over various aspects of our lives. They have in many ways, but the shift has always been gradual. This all changed in 2020 when most of us were forced to stay home. From the way we work, go to school, interact with our healthcare providers, manage our finances, shop, and connect with friends and families – mobile is now at the centre of our lives.
As we look ahead towards 2021, this shift will continue. Here are five predictions about how we anticipate individuals and organisations will be forced to confront the threats targeting their information, privacy and devices.
We are partnering with Splunk to offer a 10 minute micro-webinar covering all things Splunk & NHS! Please join us on Thursday February 25th at 12pm for 10 minutes, to hear about the following:
- Splunk NHS customer references & use cases
- The Splunk NHS starter bundle for SIEM or IT Ops
- The Splunk NHS pricing agreement & FREE education for NHS customers
- Splunk's 2000 (FREE) out of the box apps, including the new DSPT app!
The IT industry is responsible for approximately two percent of worldwide carbon emissions, which is roughly equivalent to the carbon emissions attributed to the aviation industry.
Although IT is part of the problem of increasing energy demands and carbon emissions, sustainable and efficient IT is key to the solution. By combining social responsibility, smart resource use and technological innovation, Green IT goes some way in addressing some of the technological solutions that could make many sectors more efficient.
Join us on the 15th December at 11am as Core to Cloud are joined by Arcserve and N2S to discuss what the future holds for Green IT.
Key discussions for this panel
- We have 10 Years to achieve carbon neutrality: What can we do NOW?
- What role does IT and Digital Transformation play in the carbon neutrality agenda?
- 2030: What steps do we need to take now to achieve sustainability?
- Andrew Gomarsall from N2S the UK's market leader in IT security and data protection services including IT Installations, IT Recycling and Data Destruction services.
- Paul Brunyee from Arcserve, Arcserve is a provider of data protection, replication and recovery solutions.
Register today to find out how you can play your part is supporting the sustainability goals.
Microsoft continues to grow as the world’s most adopted SaaS application provider with over 258 million Office 365 and 75 million Teams users, according to the company’s third-quarter earnings call in 2020. As a result, it has become a rich repository for critical business data and a tantalizing target for cyberattackers.
Join us on November 26th at 11am to learn how Cognito Detect for Office 365 detects how cybercriminals use account take over and legitimate Office 365 services to bypass security controls to execute attacks. We’ll share insights from our recently published research in the 2020 Spotlight Report for Office 365, which identifies the tools and services within the cloud-based application commonly being leveraged by attackers. By observing 4 million Office 365 accounts over a 90-day period, Vectra were able to identify suspicious high-risk behaviours associated with attacker techniques exploiting built-in Office 365 capabilities.
• David Lomax, Vectra, will be walking you through the impact of Office 365 on security, how important keeping a watchful eye on the misuse of user access across on premises networks and cloud instances
• Kevin Orritt, ICT Security Manager at Greater Manchester Mental Health Foundation Trust will be discussing his own experience with the Office 365 integration as well as outlining the part he has played in shaping this solution with Vectra.
There will be a chance at the end to get any of your questions answered so stay tuned.
Phil Howe, James Cunningham, Steve Armstrong and Shaun Van Niekerk
Join us to learn about how NHS Trusts are benefiting from continuous Penetration Testing. We will be taking you through the experiences from various Trusts, as well as covering the Pcysys Roadmap and the exclusive NHS Framework Pricing.
The Agenda For the Session
10:00 – 10:20 You will be joined by our by our new CTO, Phil Howe. Phil spent over 10 years as part of the senior management team within the NHS and we are very excited to have him on board. Phil will be giving an overview of Pcysys Automated PenTesting.
10:20 – 10:40 Shaun van Niekerk, Head of IT & Cyber at Dartford NHS Hospital will be discussing his experience with the solution within an NHS trust, DSPT returns and why he believes this would benefit the NHS remarkably.
10:40 – 11:00 James Cunningham, Co-Founder at Core to Cloud and Steve Armstrong at Pcysys will be discussing the Pcysys roadmap and the exclusive NHS Framework Pricing.
Phil Howe CTO, Toby Newbatt Vectra AI, Dominic Ryder Vectra AI, Ben Hollands Pcysys and Nick Nieves Stealthbits
Join us to take a closer look at the technologies used to address Cyber and Information Governance concerns within the NHS. Who better to take you through this journey than our new CTO who has first-hand experience of the benefits these solutions provide in a healthcare setting.
This will be the first workshop ran by our new CTO, Phil Howe. Phil spent over 10 years as part of the senior management team within the NHS and we are very excited to have him on board.
We will look closely at the capabilities of the three solutions in question, followed by a Q&A session for each.
We will also discuss their impact in the following areas:
Vectra, Network Visibility – Enabling the trust with the tools to provide real-time attack visibility. The ability to quickly and efficiently identify hidden cyber attackers within a network before they can cause irreparable damage.
Pcysys, Security Validation – The ability to find and prioritise vulnerabilities across the entire IT network . Conducting continuous ethical exploits based on infrastructure vulnerabilities, to identify threat-based weaknesses.
Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas
Join us on Thursday 10th September at 11am to witness a live cyber-attack. Watch how a sophisticated attacker moves and see how world-class defenders can detect and stop the attack in its tracks!
Hosted by cyber security specialists Cybereason, they’ll give you deep insight into the motivations, behaviours and strategies of the attackers, why current security approaches fail and how you can gain the upper hand.
So, if you are responsible for protecting your organisation from cyberattacks, you don’t want to miss this!
Every organisation today utilises mobile as a productivity tool by providing a full range of access to corporate resources for iOS and Android devices. With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity.
Join Lookout and Eurofins to learn from the hacker's perspective:
Why attackers are now relying heavily on mobile in their campaigns
The methods that they utilise to compromise these devices
What this means for your organisation
Whether you were ready or not, your organisation had to rapidly adapt to remote work as the coronavirus pandemic shut down office space around the world. While some economies are slowly opening up, it’s likely that many of your employees will choose to work from where they feel the safest – outside the office. In other words, remote work is here to stay.
Your IT and security teams now have less control and visibility into your employees’ work environment and the risks involved. With your employees permanently working outside your office perimeter, you need to establish security measures that can continuously protect your data and your employees. Hybrid IT models will rise out of this shift and securing mobility will become more important than ever.
Join us in our latest webinar to find out how you can permanently secure a remote workforce:
How is work-from-home shifting to work-from-anywhere?
How do you secure your workforce when they’re no longer inside your corporate network?
How can mobile security help empower productivity amid work-from-anywhere?
What organisations are doing to tackle remote work challenges?
Learn how customers who deploy the Cybereason Defence Platform can dramatically reduce the likelihood of a cybersecurity breach, significantly increase their security teams efficiency to detect and respond to cyber threats all while reducing the resources needed to manage the security platform.
Cybereason commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to quantify the benefits customers are able to experience by protecting their environment with the Cybereason Defence Platform, a complete endpoint protection platform.
By using Cybereason customers are able to:
Realise a 308% Return On Investment
Gain better visibility into their endpoints and overall threat landscape, improving their security posture
Improve in the efficiency to detect and respond to threats by 93%
Reduce the time needed to manage the security platform by 75% via a single agent and single console
Avoid expensive future security analyst hires, resulting in savings of more than $288,000 over three years.
Please join our guest speakers to learn more about the key benefits to customers from the Forrester TEI study and how you can take advantage of key capabilities and features within the Cybereason Defence Platform to protect your enterprise from today’s cyber threats.
Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn’t gone away and has returned with a vengeance. The “tried and true” source of revenue, projected at $17B in 2020, for cyber criminals now comes with capabilities and new tactics to ensure money is paid by the victims it has been inflicted upon.
The Cybereason research team, Nocturnus, continues to follow the latest ransomware trends based upon what is happening in the underground and the Cybereason Incident Response team has first hand experience and lessons learned based upon what customers have encountered. Please join this webinar to get insights from Cybereason experts on the current state of ransomware and what you can do to prepare for the next ransomware attack.
Some highlights of the ransomware discussion will include:
Evolution of ransomware
Current trends and new tactics
Lessons from the field
How to better protect your organisation from ransomware
We look forward to having you attend this engaging and in-depth discussion with our experienced cyber security speakers. Be sure to register so you can gain a better understanding of what is happening with ransomware and how you can better protect your organisation from the latest ransomware attack.
Customers running a Sophos cybersecurity system report a 90% reduction in day-to-day admin, and an 85% cut in security incidents requiring investigation. Join us for this informative webinar to learn about the real-world business impact of a Sophos system, and how you can enjoy efficiency and security savings like these. We’ll explore:
• The Sophos cybersecurity system – what it is and why it’s different
The mobile security landscape is constantly evolving. With more reliance than ever on mobile devices for both personal and business use, the entire world is looking at mobile accessibility as the vehicle to higher connectivity and better productivity. Malicious actors have taken note of how reliant we are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or an organization.
Across all geographies and industries, there is a steady increase in the rate of both consumer and corporate users encountering mobile phishing attacks. The financial risk of falling victim to a phishing attack can be devastating to an organisation. For a large multinational company, they could be looking at hundreds of millions of dollars in losses from a successful phishing attack. Even for smaller organisations, like a regional healthcare system, the risk still falls in the tens of millions of dollars.
Mobile phishing is a problem that can no longer be ignored, no matter what part of the world or industry an organisation operates in.
A walk-through of the emerging challenges and solutions to securing data in the cloud.
Recent high-profile incidents highlight how cyberattacks are moving to the cloud more and more, taking advantage of gaps in protection, team responsibilities, and cloud security knowledge.
The need to fully understand the shared security responsibilities you have with cloud providers, and how Sophos solutions protect users, applications, and data across every cloud is more important than ever.
Are you able to hunt for and rapidly contain sophisticated cyber threats across your network?
Organisations spend valuable time and resource sifting through large volumes of log data which often does little more than create additional alerts for already overloaded security operations teams.
It’s important that security teams leverage the right tools and technology to monitor their entire environment, while continuously applying specialised threat hunting techniques to detect and respond to attacks that have bypassed traditional controls.
To be able to manage detection and response in the SOC, requires using AI and machine learning to investigate, auto contain threats, and orchestrate response. By utilising NDR, EDR and SOAR solutions, your SOC team will be able to provide threat intelligence, threat hunting, security monitoring, incident analysis, and incident response across the network.
Join Martin Barrett, SE Manager, Cybereason, Nimmy Reichenberg, CMO, Siemplify, and David Lomax, SE Manager, Vectra on this webinar to understand more about how you can benefit by applying a Managed Detection and Response model, making your SOC team more efficient.
At Core to Cloud we pride ourselves on being a different type of solutions provider. We have in-depth industry experience, with a strong focus on security, compliance and the cloud. This channel is for anyone who is passionate about Cyber Security and how we can better equip ourselves.
Whether you’re looking at ways intruders can get into your network, the security of your devices, the safety of your data or offering training to make your team a stronger line of defence – we’ve trialled the best technologies on the market in a variety of environments.
Our channel will include educational panel debates, industry expert speakers, our customer reviews, technology demos and much more. We hope you enjoy our channel - a place for us all to learn from each other.