Hi [[ session.user.profile.firstName ]]

Overcoming ‘Shadow IT’ Need and Risk

The escalating use of shadow IT – information technology outside IT approval – creates significant risk to organizations and is one of the biggest challenges in digital forensics today.

During investigations, incidents, litigation or regulatory and legal compliance, companies must be able to acquire, preserve, analyse, examine and present digital media in a forensically sound manner.

According to McAfee, 80% of workers admit to using SaaS applications at work, in many cases without IT approval. Bring Your Own Device (BYOD) policies and remote working since the pandemic have continued to blur the lines between company and personal device usage.

Organizations need to understand how to get to grips with the expanding shadow IT environment in order to overcome the need and risk attached.

Join this webinar to learn:
· The growing challenges and risk of shadow IT
· Strategies for overcoming shadow IT, including the importance of staff awareness training
· How technologies can help enforce policies, protect data and intellectual property, and reduce costs
Live online Jul 8 2:00 pm UTC
or after on demand 75 mins
Your place is confirmed,
we'll send you email reminders
Presented by
James Coker
Presentation preview: Overcoming ‘Shadow IT’ Need and Risk
  • Channel
  • Channel profile
  • Third-Party Vulnerabilities: Demystifying the Unknown Jul 29 2021 5:00 pm UTC 75 mins
    Danny Bradbury
    What parts of your cyber supply chain are you unknowingly neglecting? The SolarWinds hack was a wake-up call for companies to check their suppliers and partners for risk. There are still plenty of other dangers lurking in third party systems ranging from software applications and APIs through to embedded devices, chipsets, firmware, and IoT solutions.

    These risks lie in other organizations' assets and are seemingly out of your control, but there are protective measures that you can take. Attending this webinar will give you a new perspective on this complex challenge and some actionable insights on where to begin.

    Talking points will include:
    - The kinds of vulnerabilities that exist in third-party resources
    - How to audit for supply chain vulnerabilities
    - Strategies for mitigating supply chain availabilities early
  • Building a Privileged Access Management Strategy for the Post-COVID World Jul 22 2021 5:00 pm UTC 75 mins
    James Coker
    Improvements in cybersecurity technologies have made it more difficult for threat actors to mount direct attacks on organizations’ networks. Cyber-criminals are therefore increasingly looking for alternative routes into systems to steal sensitive and confidential data. One of these involves compromising the login credentials of employees or external contractors/vendors, especially those who have privileged accounts and are able to freely access sensitive systems and data.

    This issue has been exacerbated by the COVID-19 pandemic, with remote employees more vulnerable to having their login credentials compromised. A zero-trust model of security has regularly been highlighted as vital to keeping a hybrid workforce secure alongside internal employees and external contractors, and this must be underpinned by a strong privileged access management policy, ensuring that compromised accounts do not lead to disastrous data breaches for businesses.
    This webinar will explore the latest trends and challenges in privileged access management, and outline the strategies and technologies required to stay one step ahead of threat actors.

    In this webinar, a panel of experts will discuss:
    · How threat actors are increasingly targeting staff or contractor accounts to steal sensitive data
    · The importance of privileged access management in keeping organizations secure, particularly for a hybrid workforce
    · The steps required to develop a successful privileged access management policy
  • Overcoming ‘Shadow IT’ Need and Risk Jul 8 2021 2:00 pm UTC 75 mins
    James Coker
    The escalating use of shadow IT – information technology outside IT approval – creates significant risk to organizations and is one of the biggest challenges in digital forensics today.

    During investigations, incidents, litigation or regulatory and legal compliance, companies must be able to acquire, preserve, analyse, examine and present digital media in a forensically sound manner.

    According to McAfee, 80% of workers admit to using SaaS applications at work, in many cases without IT approval. Bring Your Own Device (BYOD) policies and remote working since the pandemic have continued to blur the lines between company and personal device usage.

    Organizations need to understand how to get to grips with the expanding shadow IT environment in order to overcome the need and risk attached.

    Join this webinar to learn:
    · The growing challenges and risk of shadow IT
    · Strategies for overcoming shadow IT, including the importance of staff awareness training
    · How technologies can help enforce policies, protect data and intellectual property, and reduce costs
  • How To Achieve Passwordless Authentication and Cohesive Credential Management Jul 1 2021 5:00 pm UTC 75 mins
    Danny Bradbury
    Access Identity credentials are one of your organization's biggest secrets. They're like oil: valuable, powerful, and - in the wrong hands - highly toxic. How can you manage them and make sure they’re secure?

    In this webinar, our panel of experts will discuss the nature of access identity credentials, how they have evolved, and
    some of the risks involved with not managing them properly.

    We will also look at how you can keep credentials safe. What are the common credential management tasks that cause companies problems? How does the technical environment (for example, machine-to-machine infrastructure machine identities vs human users) affect credential management tasks? How can we ensure that end-users register and use
    their credentials when they receive them, especially in a world of remote work? What best practices can companies follow when managing credentials, and how can technology help?

    Talking points will include:
    - What the modern credential authentication landscape looks like.
    - Common credential management problems facing administrators.
    - How credential management challenges face will change as we move to a passwordless world.
  • The Battle of Algorithms: How AI is beating AI at its own game Jul 1 2021 2:00 pm UTC 75 mins
    Eleanor Dallaway
    Among rapidly evolving technological advancements, the emergence of AI-enhanced malware is making cyber-attacks exponentially more dangerous, and harder to identify.

    As AI-driven attacks evolve, they will be almost indistinguishable from genuine activity, and conducted at an unprecedented speed and scale. In the face of offensive AI, only defensive AI can fight back, detecting even the most subtle indicators of attack in real time, and respond with surgical actions to neutralize threats - wherever they strike.

    In this session, discover:
    · How cyber-criminals are leveraging AI tools to create sophisticated cyber weapons
    · What an AI-powered spoofing threat may look like, and why humans will not be able to spot them
    · Why defensive AI technologies are uniquely positioned to fight back
  • How To Navigate the Critical Intersection Between Data Security and Data Privacy Jun 24 2021 5:00 pm UTC 75 mins
    Eleanor Dallaway
    Standard security controls are excellent at ensuring that data stays secure and is only accessed by those with appropriate permissions. However, where security fails is knowing the information that privacy requires, such as where the data came from, why the data is being stored, who the data belongs to, who it’s shared with, and how long it will be retained. The answers to those questions for every system or data element has an impact on which security controls a company needs to have in place.

    Join Infosecurity Magazine and data expert Chris Pin as he explains the critical intersection between data security and data privacy, including:
    · The key differences between data security and data privacy
    · Why it’s possible to have security without privacy, but impossible to have privacy without security
    · How to enable and support both security and privacy when it comes to data
  • Defining the Zero Trust and SASE Relationship Jun 24 2021 2:00 pm UTC 75 mins
    James Coker
    By taking a Zero Trust approach, security departments assume that all content–regardless of whether it originates from a trusted source–is untrustworthy. Treating all content as if it is malicious eliminates the need to make an allow-or-block decision at the point of a click. With cyber-attacks and data breaches becoming more prevalent since the shift to remote working, traditional detect-and-remediate approaches to cybersecurity are falling short and security leaders are increasingly adopting Zero Trust as a way to overcome the challenges presented by the anywhere, anytime workforce.

    In addition, amid growing cloud adoption, many security leaders are looking to introducing Secure Access Service Edge (SASE) architecture into their organizations. Is there a tie between Zero Trust and SASE? Does SASE come in a box? Do you need to choose between one or the other?

    During this session, a panel of experts will tackle these questions and discuss:
    - Why focusing on detection is a reactive approach to security
    - The relationship between SASE and Zero Trust
    - Why isolation is the secret sauce in today’s fight against online security threats
  • Managing the cybersecurity transition to the cloud Jun 17 2021 5:00 pm UTC 75 mins
    Danny Bradbury
    Moving your cybersecurity to the cloud is a good way to protect your entire infrastructure, both in the cloud and on-premise. It makes security more consistent and scalable, and it integrates tightly with cloud-native systems. But for many, it's still a daunting prospect.

    This webinar explores the process of transitioning your cybersecurity operation to the cloud, either as a standalone project, or as a necessary part of a broader cloud migration.

    You'll leave with a better understanding of what to watch out for, what the best practices
    are, and how your service provider can help ease the journey.

    Talking points will include:
    - The biggest concerns about moving cybersecurity measures to the cloud
    - How cloud security has evolved and improved over the last decade
    - Common misconceptions about cloud security
  • Secure Access Management: Modernize your IT Infrastructure Jun 17 2021 2:00 pm UTC 75 mins
    Eleanor Dallaway
    The global shift to remote working as the world tackles the COVID-19 pandemic has left employees needing to remotely access applications in cloud and on-premise, which, in turn, has left organizations needing to secure that access.

    It’s important that employers enable their staff to thrive in the new working environment by ensuring everyone has the right access without compromising security.

    In this webinar you will:
    · Learn how to reduce costs, minimize friction for users and simplify operations
    · Understand how to protect your IP and avoid becoming victim to phishing and ransomware attacks
    · Consider the steps needed to modernize your IT infrastructure
  • The Challenge of Remote File Transfer Security: Is Consolidation the Answer? Recorded: Jun 10 2021 61 mins
    James Coker
    The shift to remote working has thrown up a number of significant security challenges to organizations, one of which relates to the exchange of files. With employees increasingly needing to collaborate from different locations and share sensitive corporate data across digital channels, organizations are at much higher risk of being breached.

    Simply having secure data policies are not alone sufficient, and encrypted file exchange solutions must combine strong security with efficiency, otherwise staff will simply find ways round these protocols. In this session, a panel of experts will highlight the importance of consolidation of tools in achieving great collaboration and security for the transfer of files, ensuring policies are adhered to.

    In this session, we will discuss:
    • Why remote employees will often sidestep secure data policies
    • The security and collaboration challenges posed by using multiple vendor solutions and the importance of consolidation
    • The importance of employee-friendly secure collaboration tools
  • How to secure the new world of distributed work Recorded: Jun 3 2021 60 mins
    Moderator: Danny Bradbury
    Today, organizations face more distributed workforces than ever, spanning not just internal teams but also contractors and freelancers. Securing work between these different kinds of employees across numerous locations introduces security challenges. Teams must stay productive while grappling with security measures such as site whitelisting, performance issues with remote virtual desktop access, and requirements like VPN solutions to access company resources.

    This webinar will explore the challenges facing these companies, including the need to balance security and productivity. How can organizations make work seamless and productive while locking down sensitive data and applications from intruders?

    Talking points will include:
    - The biggest challenges facing companies supporting long-term distributed working practices
    - Ways to achieve both productivity and security in distributed work
    - Security management techniques that can help mitigate those challenges
  • How to Win Budget & Buy-in from the C-Suite to Mitigate Increased Threats Recorded: Jun 3 2021 62 mins
    Moderator: Eleanor Dallaway
    Protecting your company’s crown jewels is a cliché, but it’s a cliché that has become even more important in the wake of a pandemic that has forced the world to work remotely. Cyber-threats have increased and C-Suites have taken notice, but converting that awareness into budget investment, commitment and a fundamental change in their practices to minimise cyber threats is another matter.

    A top down approach is essential to a successful cybersecurity strategy – starting by protecting the company’s most sensitive information and most important assets, often held by board members and the c-suite. But to do this, you need your board members to understand the new threat landscape in a working-from-home environment, the importance of managing risk, and how to improve your organisations cybersecurity posture.

    In this webinar, you will:
    - Learn how to navigate the increased level of threat your c-suite and board members face in the virtual WFH world
    - Learn how to get the attention of your C-suite and foster a top-down approach
    - Understand Cyber Risk Scorecards and how to use them
    - Get advice on how to win buy-in and budget from the C-suite and Board
  • Data Classification: The Foundation of Effective Cybersecurity Recorded: May 27 2021 62 mins
    James Coker
    Amid a surge in new international data privacy laws and regulations, it is becoming increasingly challenging for organizations to stay compliant. It has therefore never been more important to develop secure infrastructure to enable compliance obligations to be fulfilled, particularly following the shift to remote working during the COVID-19 crisis.

    The first step to achieving this aim is data classification, which provides a solid foundation to build towards onward compliance. In this webinar, a panel of experts will explain how integrating data classification with necessary data protection tools such as DLP, rights management, encryption and more, will elevate your cybersecurity strategy. There will also be advice and tips on the right steps to take on this journey.

    This session will demonstrate:
    - The increasingly challenging cybersecurity and data protection landscape
    - How to develop a robust compliance and data loss architecture
    - Why classification by design is the foundation of effective data protection and compliance
  • Zero Trust in 2021: How to Seamlessly Protect Your Remote and In-Office Users Recorded: May 20 2021 60 mins
    Danny Bradbury
    The adoption of zero trust services has accelerated as work locations become more fluid and flexible between office and home. That said, it’s now more critical than ever to ensure that users have fast, seamless and secure application access regardless of where they’re connecting.

    In this webinar, a panel of security experts will discuss how zero trust security principles provide consistent user experiences when accessing private applications, regardless of the user’s or app’s location.

    Join the conversation to learn:
    - How zero trust is beneficial for in-office users along with remote users
    - How to create a blueprint to ensure a consistent experience when users are accessing private applications
    - How to provide fast, secure, local access to internal applications while simplifying the IT infrastructure
  • How Zero Trust Enables Remote Working and Builds to a SASE Vision Recorded: May 13 2021 62 mins
    James Coker
    IT and security leaders are moving forward with the new realities of the hybrid workplace. Working from home, or remotely, is now just ‘work’. As employees begin to mobilize again, organizations need to maintain an agile and frictionless security model, which at the same time compliments an ever-growing migration of applications to the cloud.

    Zero Trust has surfaced as a strategy that shifts the dependency on the user’s location and traditional VPN’s, to policy-based access to applications, wherever they reside.

    In this webinar, a panel of expert speakers will discuss how Zero Trust security was propelled forward in 2020, and the vital role of secure access service edge (SASE) in implementing this approach going forward, as more organizations undergo digital transformations.

    Key takeaways:
    - Why move to a user-centric and location-agnostic Zero Trust security model
    - How Zero Trust Network Access (ZTNA) can be the next step in your SASE adoption
    - How an edge strategy supports organizations’ future digital growth
  • Supply Chain Security: Easing the Headache of Third-Party Risk Assessments Recorded: May 6 2021 62 mins
    James Coker
    Third-party security and risk assessments have always been important, but rapid digitization and outsourcing during the COVID-19 pandemic has brought the topic to even greater prominence. High-profile attacks are occurring as a result of third-party vulnerabilities and it’s becoming an increasingly talked about topic at board level, particularly in light of the SolarWinds attacks.

    A thorough understanding of the risks within a supply chain will be essential going forward, with external customers and senior leadership within an organization wanting to be satisfied that third party partners are meeting security and regulatory compliance rules.

    The traditional approach of sending questionnaires to companies is costly, time-consuming and often ineffective, particularly in the current landscape. In this webinar, a panel of experts will discuss how security and regulatory teams can conduct efficient and accurate assessments of the security vulnerabilities in third parties, as well as ensure data protection rules are being met.

    In this session, attendees will learn:
    - How the COVID-19 crisis has made it easier for malicious actors to target supply chains, and the potential damage that can be caused by successful attacks
    - The inadequacies of current approaches to vendor risk management and the growing availability of cutting-edge solutions
    - How to benefit from a centralized risk assessment exchange that combines both enterprise and third-party vendors on the same platform
    - How to guard against failures in third party risk management
  • Endpoint Strategies: Balancing Productivity and Security Recorded: Apr 29 2021 63 mins
    Eleanor Dallaway
    Secure endpoint management is critical to modern business success. What’s more, the move to mass remote and hybrid working models as a result of the COVID-19 pandemic has pushed endpoint security even further up the importance agenda.

    However, challenges persist for organizations in finding the correct balance between endpoint security and productivity, with one threatening to outweigh the other if sound strategy and due diligence are not in place to ensure users are able to operate both effectively and safely.

    In this webinar, a panel of security experts will discuss the current enterprise endpoint security landscape, assess how to best balance usability with secure processes and outline the risks of failing to do so for modern organizations.

    Key takeaways:
    · A step-by-step guide to hardening your endpoint security strategy
    · Why secure endpoint management is a combined business responsibility
    · How to address the balance of end point usability and security in modern organizations
  • Securing Remote Employee Devices with Unified Endpoint Management Recorded: Apr 22 2021 64 mins
    Moderator: James Coker
    In recent years, there has been a huge expansion of devices used within organizations, an issue exacerbated further by the shift to remote working during COVID-19. This has significantly increased the number of endpoints used by organizations, leaving them more vulnerable to attacks.

    In this webinar, a panel of experts will highlight the challenges surrounding the management of endpoints in the current environment and explore why new ways of thinking are required to ensure organizations stay secure. The discussion will set out advice for organizations in establishing a strategy to secure device endpoints wherever their employees are based, including the potential benefits of a Unified Endpoint Management (UEM) strategy.

    Key takeaways:
    · Major trends within the device management and security landscape
    · The key approaches to endpoint management, with real-time use cases
    · How UEM can improve device security for remote workers
  • What You Need to Know about MSSP: Busting the Myths, Mistakes and Misconceptions Recorded: Apr 22 2021 64 mins
    Moderator: Eleanor Dallaway; Speakers: Greg Heard, Tee Patel, Ally Turnbull and Martin Webley
    Choosing your managed security services provider (MSSP) can often feel like a leap of faith – but it shouldn’t. When you sign on the dotted line, you want to know that they can support your team and provide the level of security and assurance you need.

    So, what should you be looking for when selecting your MSSP? Including expert advice from Microsoft and industry thought-leaders, this webinar will answer that question and more, arming you with the key information you need to be able to choose your MSSP with confidence.

    Register for the webinar to learn:
    - What a managed security services provider is – and what it isn’t
    - The key trust marks and certifications to look for
    How an MSSP should adapt to meet your unique challenges
    - How an MSSP can keep you both secure and compliant
    - Why your MSSP must operate as a partner, not just a provider
  • Security Certification: Gain Competitive Advantage as the Low Risk Option Recorded: Apr 15 2021 60 mins
    Moderator: Danny Bradbury; Speakers: Anthony Galfo, more TBC
    Security certifications such as ISO 27001 and SOC 2 are becoming table stakes for passing vendor assessments when looking to sell to new companies and renew existing contracts. As security demands continue the trend of becoming more and more stringent, information security teams are having to do more with the same or even reduced resources.

    In this webinar, a panel of experts will discuss how security teams are tackling this problem and outline some of the tools they use to make managing their increasing workload more manageable, along with highlighting the efficiencies that can be realized when pursuing multiple security certifications.



    Key takeaways:
    - The business and competitive benefits of pursuing security certifications such as ISO 27001 and SOC 2
    - How to deal with increased security demand with limited resources
    - Best practice for achieving and maintaining security certifications
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Overcoming ‘Shadow IT’ Need and Risk
  • Live at: Jul 8 2021 2:00 pm
  • Presented by: James Coker
  • From:
Your email has been sent.
or close