10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

How insider threats and the dark web increase remote work risks for organizations

By Veriato The “Dark Web” is often portrayed as a gloomy realm of internet land where you can find criminals and offenders lurking around every corner. Though there is some truth to this perception, there are also many misconceptions about the Dark Web and its role in the security or insecurity of businesses. Furthermore, the […]

Cybersecurity is not a one-stop-shop

By Steve Law, CTO, Giacom and Kelvin Murray, Threat Researcher, Webroot Boris Johnson announced the Government’s roadmap to lift Coronavirus restrictions for both businesses and the general public earlier in February, and since then, this has provided a glimmer of hope for many across the country. However, since the start of the pandemic, the way business is conducted […]

The Complete Guide to Online Brand Protection

By Digital Shadows Effective Online Brand Protection requires continual monitoring and remediation of threats to a company’s brands across social, mobile, websites, and other external sources. This approach often requires the involvement of the security, marketing, brand, and legal teams. While approaches to Online Brand Protection once amounted to tracking negative sentiment on Twitter, this […]

WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare

By SentinelOne and ReliaQuest SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the […]

Cyber Threat Intelligence – Solutions Guide & Best Practices

By Digital Shadows Cyber threat intelligence (CTI) improves the resilience of your business against emerging cyber threats. The best CTI program informs preventative and proactive security actions and is intimately tied to business concerns and effective reduction of risk. This guide serves to: Navigate you through the jargon surrounding cyber threat intelligence Outline some of […]

WHITE PAPER: Future-proofing endpoint management

By Quest New devices, platforms, applications, and technologies connecting to the network are overwhelming IT’s ability to manage endpoints across the enterprise. Adding to the complexity, many organizations have disparate systems or processes for managing desktop and mobile devices. This white paper examines endpoint management issues and reviews best practices for administering, managing and securing […]

The cloud security challenge every CISO must overcome

By Keith Glancey, Systems Engineering Manager at Infoblox  Cloud adoption has never been higher. Whether it’s public, private, multi- or even hybrid-cloud environments, organisations of all sizes, across all sectors are benefiting from the enhanced flexibility, reduced cost and greater stability that cloud can bring.  However, whilst cloud can be an enabler in many areas, it can also […]

White Paper: Maximize Your SIEM with Precise Active Directory Security Details

Filling the Active Directory Security Gaps in Your SIEM Lateral movement and privilege escalations through Active Directory are the root cause of all breaches. SIEM solutions are not new, and most organizations rely on them to measure the overall security of the network and devices that the SIEM is monitoring. SIEMs can gather log information […]