Preparing yourself for a successful red team
A successful cybersecurity assessment starts well before any report is delivered, even before testers are allowed anywhere near a company’s network, application or device....
31st October 2018Breakfast Briefing: How to plan an annual cybersecurity strategy
11 January 2019
A solid and comprehensive cybersecurity strategy can protect your business from threat actors. In 2017, 93 per cent of all breaches could have been avoided with simple cyber hygiene practices. Identify concrete ways to improve your organisation’s security mindset and stay one step ahead of attackers.
Click here to register your place
Breakfast Briefing: How to affect change and implement results after a penetration test
8 February 2019
The first few weeks after a penetration test is critical. Having a concise and comprehensive post-test strategy is necessary for moving forward securely. Receive a clear understanding of what the next steps should be after you receive the report following a successful penetration test.
Click here to register your place
An Intro to Cybersecurity for Start-ups and SMEs
4 March 2019
Security issues can become more costly the longer you leave them unresolved and the best time to fix an issue is before it becomes one. In this workshop, we will look at the benefits of security by design and shared practical security tips for creating effective passwords.
Click here to register your place
Breakfast Briefing: How secure are your suppliers?
TBA
Supply chain attacks have evolved over time and as supply chains increase in both size and complexity, they can often provide hackers with a host of opportunities to exploit your organisation. Don’t allow their vulnerabilities to weaken your security.
Booking will open soon
A successful cybersecurity assessment starts well before any report is delivered, even before testers are allowed anywhere near a company’s network, application or device....
31st October 2018When you think about hacking you probably think about technology. Hackers digitally breaking into an organisation or government systems, stealing data or bringing down whole networks. But ...
24th October 2018Supply chains are increasing, both in terms of size and complexity, and more and more third-parties now have access to company data than ever before....
3rd October 2018