On-Demand Events

Upcoming Events
Filter by
Choose a date range
Search by keyword
Array
Webinars

You moved your infrastructure to the Cloud - Do you know your Cloud Exposure?

Bernard Montel, EMEA Technical Director and Security Strategist at Tenable explores the evolution from vulnerability management to exposure management and main risks associated with cloud exposure.

Location Online
Array
Webinars

Good AI Gone Bad - A Zero Trust Story

In this session we will be focussing on AI adoption, key challenges for CISO and cyber managers and how to plan for business continuity.

Location Online
Array

Improving your Policy Framework with the ISF's Standard of Good Practice for Information Security

ISF experts Nick Frost, Dan Rycroft and Jean-Michel Chapon share a comprehensive approach to policy development, stakeholder engagement, and alignment with budget cycles.

Location Online
Array

Through the Looking glass: ISF's predictions on past, present and future threats

Paul Holland, Head of Research, ISF, will share insight on how the accuracy of ISF's Threat Horizon predictions can help future cyber security planning.

Location Online
Array

How to build an anti-fragile Cloud SOC

This session explores how current people, process and technology issues are leading to fragile cloud security operations for many organisations.

Location Online
Array

Let’s Stop Talking About Security Awareness and Focus on Culture Instead

In this webinar, Principal Research Analyst Richard Absalom will provide tips on how organisations can move beyond raising awareness, to embedding security behaviours.

Location Online
Array

NIS 2 Directive: Addressing seven common challenges

Join our in house EU regulatory expert Luka Ivezic, as he outlines NIS 2 Directves core challenges and the road to compliance.

Location Online
Array

Protecting My Business on a Limited Budget

Gain perspective on the critical challenges facing organizations worldwide and how to mitigate them with increasingly limited resources.

Location Online
Array

Are you prepared for the next attack? The state of application security in 2024

This session explores the trends shaping the API threat landscape today, including vulnerability exploitation, DDoS attacks, bot traffic.

Location Online
Array

ISF Tools: A holistic approach to security

Hear directly from Alex Jordan, Head of Tools & Methodologies, and Francesca Williamson, ISF Analyst, about the recently updated ISF Tools Suite that is aligned to the 2024 version of the ISF Standard of Good Practice (SOGP)

Location Online
Array

Building with Confidence: Security from Code to Cloud

This session explores how a code-to-cloud approach can empower developers to move at the speed of the cloud without compromising security

Location Online
Array

Cyber Security Showcase Webinar Week 2024

A series of thought-provoking webinars addressing current security challenges with new and unique insight.

Location Online
Array

Evolution of Cloud Security Breaches: Building Cloud Defence

Murky and cryptic details of cloud breaches and threats fill all cybersecurity news. Sorting through…

Location Online
Array

Cyber Security in the AI Era

This session explores how advancements in machine learning technologies are empowering threat actors to create new attack vectors.

Location Online
Array
Webinars

CISO Panel: Best Practices and Emerging Trends in Supply Chain Risk Management

Over the last 2 years, 98% of organisations globally have had a 3rd party in…

Location Online
Array
Webinars

AI vs AI - How Adversaries and Security Teams use AI

Mani Keerthi Nagothu, Field CISO Associate Director shares explores how security teams can leverage AI to counterattack threat adversaries.

Location Online
Array
Webinars

Building an Effective Security Strategy for the Threats of Today and Tomorrow

Steve Durbin, CEO of ISF, Eran Ashkenazi, Chief Customer Officer, and Jane Wong, SVP of Product Management at SentinelOne share their expertise on navigating the ever-changing threat landscape.

Location Online
Array

Decoding the SEC Cybersecurity Disclosure

Gain exclusive insight as the ISF and SEC joined forces to cut through the noise surrounding their latest cyber security rules.

Location Online
Array

The Dark Side of AI

James McQuiggan, Security Awareness Advocate at KnowBe4 discusses the unforeseen threats of AI and how to protect your network.

Location Online
Array
Webinars

Untangling the Cyber Resilience Thread

ISF Principals Esther Schagen-van Luit and Mark Chaplin explore the business resilience landscape since COVID-19, presenting the key factors driving the need for cyber resilience in organisations.

Location Online
Array
Webinars

The Influence of AI in Supply Chains

In this session, ISF Analyst Francesca Wiiliamson will be discussing the potential benefits and drawbacks of implementing AI into our third-party relationships.

Location Online
Array

Building an Enterprise Data Strategy for the Modern SOC

Security, at its core, is a data problem. As data volumes grow exponentially (to the…

Location Online
Array
Webinars

Shielding the Future: Europe's cyber threat landscape report

Grant Bourzikas, CSO and Trey Guinn, CTO at Cloudflare explore the threat landscape facing security teams in Europe, and how to cope with rising volumes of incidents.

Location Online
Array
Webinars

SOGP 2024: The all-encompassing Standard of Good Practice for Information Security

Benoit Heynderickx and ISF Member Ross Johnston explore the new features of SOGP 2024 and how they can be used in security policies, and procedures.

Location Online
Array

Everything YOU Need to Know About Software Supply Chain Security

Tzachi Zorenshtain, Head of supply Chain Security at Checkmarx shares guidance on how to secure your apps with supply chain security best practices for vulnerable open source code and AI-generated hallucinations.

Location Online
Array
Webinars

Zero Trust Strategy: Why your organisation should adopt it

Shreya Tiwari and Daniel Norman share insight into the core components of Zero Trust and how organisations can embark on a Zero Trust journey.

Location Online
Array
Webinars

AI Insights: Opportunities and challenges

Lee Munson explores AI advancements and potential perils including offensive/defensive AI, governance, ethics, and data privacy.

Location Online
Array

ISF Cyber Showcase Week - May 2024

The ISF Cyber Security Showcase Week returns on 20 - 24 May 2024, presenting a lineup of engaging supply chain, zero trust and artificial intelligence webinars.

Location Online
Array

AI Frontiers in Cybersecurity: Navigating Opportunities and Threats in the Digital Landscape

Dave Barnett Head of SASE at Cloudflare examines how AI's capabilities in data processing pose new challenges for data protection.

Location Online
Array

This Time it's Personal: The latest trends in business email compromise

Josh Bartolomie, VP of Global Threat Service at Cofense, shares how to counter BEC threats with technical and people-centric strategies.

Location Online
Array

Email Security in 2024: The urgent need to adapt your approach

Jack Chapman, VP of Threat Intelligence, Egress discusses how inbound and outbound threats continue to evade traditional approaches to email security.

Location Online
Array

The Cloud Security Playbook for Financial Services

Join Ryan Kazanciyan, CISO at Wiz as he spotlights the critical need for enhanced visibility across cloud, data, and AI domains.

Location Online
Array

The Superpower of AI: Unleashing mis- and disinformation at horrific scale

Jelle Wieringa, Security Awareness Advocate delves into destructive power of disinformation, and the ways AI is being used by bad actors to influence the masses.

Location Online
Array
Webinars

AI & Cybersecurity: The current state of the art and where we're headed

Clint Gibler, Head of Security Research, Semgrap and guest speaker from Wiz, delves into current and future landscape of AI & Security

Location Online
Array
Webinars

ISF Annual Threat Update: Emerging Threats for 2024

Discover the prominent information security threats to expect in 2024 and crucial guidance on how to fortify against them.

Location Online
Array
Webinars

How well do you know your attack surface?

With more than 20% of all interactive intrusions associated with the exploitation of public-facing applications,…

Location Online
Array
Webinars

A Unified Approach to Compliance

Discover how the ISF SOGP is supporting leading global organizations in managing compliance across multiple standards and jurisdictions.

Location Online
Array
Showcase Week Webinars

Manage Risk the ISF Way

Join Benoit Heynderickx and Hui Shan as they explore how different ISF materials can be combined and used to effectively manage risk.

Location Online
Array
Showcase Week Webinars

Lessons From the Frontline: What we learn from Cyber Simulation Exercises

Join Mark Chaplin, ISF Principal as he provides insights into Cyber Exercises and the success factors and pitfalls that challenge organisations

Location Online
Array
Showcase Week Webinars

Threat Landscape 2023

Join Peter Watts, Cyber Security Specialist, to learn how to examine the relentlessness of today’s adversaries and the persistence required to stay a step ahead of them

Location Online
Array
Showcase Week Webinars

Human-Centred Security: Transforming security behaviours

Join Arunoshi Singh and Daniel Norman as they highlight the most effective initiatives to transform behaviour and organisational culture.

Location Online
Array
Showcase Week Webinars

Unlocking the Business Value of Security

Join Paul Watts for insights into how to accelerate a more positive change in the way security is perceived - unlocking its true potential.

Location Online
Array
Showcase Week Webinars

Surviving AI and Staying Safe

Join Mark Ward in exploring the risks posed when asking AI tools to generate text, create images, write code or just search for information.

Location Online
Array
Showcase Week Webinars

Why Cyber Security is for Everyone

Join Steve Dobson as he breaks down the five key steps everyone can do to be better aware - and better protected - from attack.

Location Online
Array
Showcase Week Webinars

Beyond Third-Party Security

Join Panorays as they analyse the benefits AI brings to the challenge of third-party security risk management and how to utilise it's power.

Location Online
Array
Showcase Week Webinars

Cyber Security Showcase Week 2023

A series of informative webinars offering unique solutions to cyber challenges for audiences with all levels of security experience.

Location Online
Array
Webinars

The Rise of the Cloud-Conscious Adversary

Mark Moore from CrowdStrike shares real-world stories of cloud attacks to explore the critical oversights leaving organisations vulnerable.

Location Online
Array
Webinars

Cyber Asset Discovery: From 'nice-to-have' to mission critical

Industry experts discuss the rising significance and growth of asset discovery and the role of data quality and speed in decision-making.

Location Online
Array
Webinars

Security Culture: Making cybersecurity an active part of your organization

Industry expert Jelle Wieringa about how you can better understand, measure and use your existing security culture to your advantage.

Location Online
Array
Webinars

Shift Left, Shield Right: The role of CWPP in a CNAPP world

From build time to runtime, join SentinelOne as they discuss the complementary roles of agentless and agent-based security layers.

Location Online
Array
Webinars

The Perfect Storm: Preparing today for the future state of cloud security

Nachiket Joshi from CrowdStrike explores embracing hybrid cloud environments against the backdrop of a continuously changing attack surface.

Location Online
Array
Webinars

Why Women Should Choose Cyber

A panel webinar focussing on supporting and cultivating a community of aspiring female information security professionals.

Location Online
Array
Webinars

Using the SOGP and CCM for Multi-Cloud Security

A webinar exploring how the cross reference can help security practitioners deploy effective controls over their multi-cloud environments.

Location Online
Array
Webinars

Illuminate the Blind Spots: Why your security investments are failing

Watch as Dawid Kowalski from FireMon explores how to illuminate the blind spots and really protect your perimeter.

Location Online
Array
Webinars

Threats to Watch Out For: A CISOs guide to application security

John Stock from Outpost24 provides insight into the most pressing threats in application security and how to effectively mitigate them.

Location Online
Array
Webinars

Perspectives on Fighting Back Against Phishing Attacks

A panel explore how stakeholders view the problem of phishing, and provide insight into how we can all start tackling this problem head-on.

Location Online
Array
Webinars

ISF Annual Threat Update: Emerging threats for 2023

Chief Executive of the ISF, Steve Durbin, took to the stage once again for our annual Emerging Threats webinar.

Location Online
Array
Showcase Week Webinars

Managing Risk the ISF Way

Gareth Haken provides insight into how the ISF's wealth of materials can be combined and used to effectively manage risk.

Location Online
Array
Showcase Week Webinars

How to Identify and Prioritise Attack Paths and Prevent their Exploitation

Bernard Montel from Tenable outlines the need for organisations to identify critical assets as soon as possible to reduce the risk of attack.

Location Online
Array
Showcase Week Webinars

The Future CISO: Securing the digital organisation of tomorrow

Where do CISOs find themselves today, and what changes should they be looking at to ensure their role continues to add value?

Location Online
Array
Showcase Week Webinars

Keeping Pace with Cybersecurity by Scaling IT Governance and Data Risk Management

Jorge Ferrer Raventos from OneTrust discusses how to reinforce your IT risk program in a 'not if, but when' incident environment.

Location Online
Array
Showcase Week Webinars

Threat Intelligence: An evolving capability

How can you better understand the threats your organisation faces, and make well-informed decisions about how to address them?

Location Online
Array
Showcase Week Webinars

The Modern Approach to Fight Phishing

As threats gain in volume, Justin Pemberton explains how you can protect your business by deploying a modern approach to email security.

Location Online
Array
Showcase Week Webinars

Supply Chain Cyber Security - Industry Specific Insights

Dan Vasile provides a BlueVoyant perspective on what can be done to better protect organisations and their supply chains.

Location Online
Array
Showcase Week Webinars

Collaborating to Shift Away from Shadow OT

Paul Holland offers author's insight into the ISF research on ICS, and how you can understand and protect these often-critical environments.

Location Online
Array
Webinars

Cyber Security Showcase Week 2022

A series of thought-provoking webinars addressing current business challenges with new and unique insight.

Location Online
Array
Showcase Week Webinars

Cyber for All: Why cyber is for everyone

Steve Dobson explores how cyber threats manifest themselves today, how the ISF can help, and how we can all reduce the risk of cyber attack.

Location Online
Array
Showcase Week Webinars

Countering Supply Chain Attacks: Where next?

Elli Tsiala from ABN AMRO discusses defending against cyber threats that take advantage of large, complex and fast-changing supply chains.

Location Online
Array
Webinars

Cyber Security Ratings Are a Thing, What Do I Do Now?

SecurityScorecard offer an approach to ensuring a vendor's security posture is sufficient to prevent attacks and ensure information security.

Location Online
Array
Webinars

Strengthen Your Security Culture: A CISOs perspective

A panel session discussing improving security behaviour and culture, featuring industry insight from experienced security professionals.

Location Online
Array
Webinars

Innovating Defence: The life of a Risk Operations Centre (ROC) Analyst

Darin Epling uncovers how the ROC can go beyond simple management and provide comprehensive defence of your vendor ecosystem.

Location Online
Array
Webinars

The Future CISO: Securing the digital organisation of the future

Former CISO Paul Watts reflects on where CISOs find themselves today, and how they can ensure their role continues to add value.

Location Online
Array
Webinars

Preparing for a Cyber Crisis: The ISF approach

Daniel Norman details how you can design realistic, impactful cyber attack simulations and playbooks to strengthen your cyber resilience.

Location Online
Array
Webinars

Optimising Third-Party Risk

Sam Parker, Senior Offering Manager at OneTrust, addresses enhancing your third-party risk program and automating data management.

Location Online
Array
Webinars

Attacks Against Critical Infrastructures are Going Physical - 3 Use Cases

Bernard Montel breaks down three domains that have been particularly affected by attacks on critical infrastructure over the last two years.

Location Online
Array
Webinars

Implementing a Zero Trust Strategy: The ISF approach

Catch up on this detailed webinar that explored a vendor-agnostic approach to implementing a Zero Trust Security Strategy.

Location Online
Array
Webinars

Cloud Native Security: The runtime security imperative

Paul Holland, Principal Research Analyst at the ISF, speaks at the Cloud Transformation Summit UK to discuss Cloud Native Security.

Location Online
Array
Webinars

Extending the SOC: What's Next in Security

Watch as BlueVoyant present a fireside chat that combined stories with predictions, while prepping for the next big thing in cyber defence.

Location Online
Array
Webinars

Top 5 Board Level Concerns for Zero Trust

Join us for this webinar highlighting the top 5 concerns boards have with Zero Trust solutions and how security executives can address them.

Location Online
Array
Webinars

The Role of Information Security in Mergers and Acquisitions

Watch as Richard Absalom discusses considering security requirements during highly sensitive, fast-moving merger and acquisition activity.

Location Online
Array
Webinars

Detailing the Major Structural Changes in ISO27002:2022

Gareth Haken presents the key changes to the new ISO/IEC 27002:2022 release, and how the ISF Standard of Good Practice has been aligned.

Location Online
Array
Webinars

Taking a Holistic View of Cybercrime: ISF and European Commission report

Join Bruce Page for a webinar discussing the key findings of a European Commission research report offering insight into tackling cybercrime.

Location Online
Array
Webinars

Living in the New Normal: Which are the Main Threats for 2022?

Chronis Kapalidis, Principal at the ISF, presents at the 9th Information Security Conference to discuss the main threats for 2022.

Location Online
Array
Webinars

Managing Cyber Risk Across your Extended Vendor Ecosystem

Join Thomas Lind, Co-Head of Strategic Intelligence at BlueVoyant, as he deepdives into a recent BlueVoyant report and cyber risk as a whole.

Location Online
Array
Webinars

Mitigating Ransomware Attacks

Watch Javvad Malik share practical advice and real-world examples of how you can defend your organisation from the ongoing ransomware threat.

Location Online
Array
Webinars

ISF Annual Threat Update: Emerging Threats for 2022

Join Steve Durbin for our annual emerging threats webinar; exploring key information security threats in 2022 and how to prepare for them.

Location Online
Array
Webinars

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What…

Location Online
Array
Webinars

Ways to survive the ransomware menace

Ransomware continues to be a clear and present danger for all organisations - as long…

Location Online
Array
Webinars

ISF Annual Threat Update Emerging Threats for 2022

Steve Durbin, Chief Executive, ISF explores key information security threats to look out for in 2022 and how you can prepare for them.

Location Online
Array
Webinars

The ultimate guide: Reduce risk with your software security initiative

The Building Software in Maturity Model (BSIMM) can help you measure and understand current levels…

Location Online
Array
Webinars

Trusted Third-Party Risk Management

Trusted Third-Party Risk Management: A strategic Model to Transform the way you Manage, Report, and…

Location Online
Array
Webinars

How to stop Phishing Threats for Office 365

With over 91% of Cyberattacks starting with a phishing attack, getting your email defences right…

Location Online
Array
Webinars

5G Security Standardisation and Knowledge Base

As Mobile Network Operators (MNOs) around the globe introduce and launch 5G systems, communications networks…

Location Online
Array
Webinars

Human-Centred Security: Effectively managing behaviour

On Tuesday 12th October at 13:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

Location Online
Array
Webinars

The Challenges of Multi-Cloud and Hybrid Security

On Thursday September 30 at 18:00 BST, Benoit Heynderickx, Principal Analyst at the ISF will…

Location Online
Array
Webinars

How do you monitor your cloud controls in a multi-cloud environment?

On Thursday 16th September at 13:00 BST, Benoit Heynderickx Principal Analyst at the ISF will…

Location Online
Array
Webinars

Threat Horizon: Emerging Cyber Risks for APAC

On Tuesday 7th September at 10:00 BST, Dan Norman, Senior Solutions Analyst at the ISF…

Location Online
Array
Webinars

Ransomware in Focus

Security Middle East: Sessions feat. Darktrace Join Dan Norman, Senior Analyst at the Information Security…

Location Online
Array
Webinars

A How-To Guide for CISOs: Navigating the Top Trends in Third-Party Risk

The world of third-party risk management is rapidly changing. Each day, organisations like yours face new security, privacy, and compliance threats when working with third parties.

Location Online
Array
CxO Events

Resistance is futile: Embracing the age of the cyber weapon

Andy Jones, Distinguished Analyst at the ISF, spoke at the Special 5th Anniversary of the…

Location Oakley Court Windsor Road, Water Oakley, Windsor, Berkshire, SL4 5UR, UK
Array
Webinars

Secure Access Management: Modernise your IT Infrastructure by Maximising Productivity and Minimising Friction

On Thursday 17th June, 15:00 BST, Paul Holland, Principal Research Analyst at the ISF spoke…

Location Online
Array
Webinars

2021 Threat Trends: Ransomware

On Thursday 17th June, 10:00 BST, Benoit Heynderickx, Principal Analyst at the ISF took part…

Location Online
Array
Webinars

Why Zero Trust Starts with Identity Security

Modern threats and recent incidents are further proof that identity has become the new security battleground and that an “assume breach” mentality is a critical starting point to developing an effective security strategy.

Location Online
Array
CxO Events

North American Threat Horizon Workshop Series: ISF Predicts 2023 – Building Resiliency

The ISF is hosting a bespoke series of events for C-Suite/Senior Executive’s in the North American Finance, Pharma & Healthcare sector based on our recently released ISF report, Threat Horizon 2023: Security at a tipping point.

Location Online
Array
CxO Events

Today’s cybercrime pandemic and what to do about it

From 1pm BST, Steve Durbin, Chief Executive at the ISF will be joined by expert speakers to share their insights on the techniques cyber criminals are using to increase the effectiveness of their criminal activity.

Location Online
Array
Webinars

Extinction Level Attacks: Surviving Ransomware and Nation States

Andy Jones, Distinguished Analyst at the ISF will be discussing his findings from this most recent research report, Extinction Level Attacks: A survival guide, in three key stages.

Location Online
Array
Webinars

What is your SASE architecture missing?

ISF and Netskope are holding an exclusive virtual event on Thursday 6th May from 12.30 – 13.30 BST where we’ll be guiding you through an online SASE assessment.

Location Online
Array
Webinars

Ransomware: It really is everywhere

This discussion set the scene of the dangers of ransomware; exploring the current trends, shifts in behaviour, criminal groups, who is being targeted, why ransomware leverages fear and how you can protect your organisation.

Array
CxO Events

Managing Supply Chain Risk the ISF Way

 The ISF recently hosted a panel discussion with guests from Nokia and Skanska AB…

Location Online
Array
Webinars

Change Automation: Turning Network Security Alerts into Action

You use multiple network security controls in your organization, but chances are, they’re not talking…

Array
Webinars

Why a Zero Trust model is driving an Identity Centric Security Strategy

As Organisations continue to adopt and embrace new technology platforms, it also brings with it…

Array
CxO Events

ISF Predicts 2023: Building resilience for an uncertain future

Hear from Steve Durbin, Chief Executive of the ISF, as he explores the key topics of our Threat Horizon 2023 report.

Array
CxO Events

Managing Operational Risk in a Downturn

During these unprecedented times, a large number of organisations had to shift their business operations…

Location Online
Array
Cloud

Cloud Security – a dynamic approach to cloud risk monitoring and reporting

On Tuesday 16th March at 15:00 GMT, Benoit Heynderickx Principal Analyst at the ISF hosted…

Array
CxO Events

Managing Information Risk: Insurance Industry Roundtable

Catch up on our recent roundtable event where our expert panel discussed how European insurance…

Array
Webinars

Continuous Supply Chain Assurance: Always know your risk

It is impossible to operate a business without having a supply chain. In the increasingly…

Array
Webinars

Cybercrime Trends of 2021: A look into Cybercrime, Nation State and Ransomware

Ransomware is on the rise—there's no doubt about that. On Thursday 18th February, 14:00 GMT/15:00…

Array
Webinars

Positively Influencing Security Behaviour: Human-Centred Security

Human error and negligence still contribute to a significant number of security incidents, yet current approaches to mitigating this risk are failing to have the desired impact.

Array
Technology

Why 5G security standards are so important and what is the latest progress?

5G promises many new capabilities and use cases, making this technology the coming preferred platform for the digitalized world. That is why security and resilience of our telco networks will become even more critical in the future.

Array
Ransomware

Human-Centred Security: Managing the insider threat

The insider threat comes in many forms, with employees acting maliciously, negligently and even accidentally…

Array
Webinars

A Wizards Guide to Security in the Cloud

A Horcrux is a powerful object in which a Dark wizard or witch [attacker] has…

Array
Webinars

Emerging Cyber Threats for 2021

Organisations have been thrust into chaos, and the role of the Security Officer and security function is about to come under increasing pressure with a number of previously unanticipated scenarios and threats over the coming months.

Array
Webinars

Assess. Comply. Assure: Eight Cyber Challenges in an Uncertain World

Cybercrime flourishes in an economic downturn, and as more organisations adopt digitalisation and move operations…

Location Online
Array
CxO Events

ISF: Managing Human risk in times of uncertainty

For millennia, attackers have been using methods of psychological manipulation to coerce humans into making…

Array
CxO Events

CxO webinar series: Managing information risk from critical suppliers

Cyber resiliency in a defining moment in history: Managing information risk from critical supplier Supply…

Array
Webinars

BSIMM11: Here’s What’s New!

The Building Security In Maturity Model (BSIMM) is a study of existing software security initiatives…

Array
CxO Events

CxO Webinar Series: Digital transformation in the Oil & Gas industry for the modern cyber security landscape

Catch up on our recent CxO webinar where the ISF were joined by industry experts…

Array
Webinars

Subnet Masks Required: How Covid-19 is changing the cyber security landscape

Covid-19 has forced many companies to work remote which has increased their risk surface. On…

Array
CxO Events

CxO webinar series: Recovery – Cyber Insurance: Making sure you are covered & bouncing back

Recovery – Cyber Insurance: Making sure you are covered & bouncing back Judy Selby, Partner, Hinshaw…

Array
CxO Events

CxO Webinar Series: Containment – The Ultimate Incident Response Exercise: Are you remotely ready?

This session explores how organisations are being forced to deal with the new and often unplanned, reality of remote working.

Array
CxO Events

CxO webinar series: Detection & Analysis – Stories from the front lines

Cyber Resiliency in a defining moment in history Detection & Analysis – Stories from the…

Array
CxO Events

CxO webinar series: Preparation – Communicating in a Cyber Crisis

Cyber Resiliency in a defining moment in history Preparation – Communicating in a Cyber Crisis…

Array
CxO Events

CxO webinar series: Cyber Resiliency – Reaping the Benefits

Cyber Resiliency in a defining moment in history Cyber Resilience - Reaping the Benefits Steve…

Array
Webinars

Legal and Regulatory Implications for Information Security

Emerging technologies and related information security trends are key drivers for regulatory change. Yet legislative…