10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

WEBINAR: Security Champions – Making the Business Case

You have an awesome idea. You plan it in full. You share it with your colleagues. What happens next? Hang-on… They’re not jumping up and down. In fact, they’re frowning. They don’t get it! Sound familiar? When that happens remember: “If you want something to change, only you can make that happen” Join us – […]

5 innovative cybersecurity training methods to try in 2021

By Juta Gurinaviciute, Chief Technology Officer at NordVPN Teams As much as 88% of data breaches are caused by human error, but only 43% of workers admit having made mistakes that compromised cybersecurity. In the past year a third of the breaches incorporated social engineering techniques and the cost of a breach caused by a human error averaged to $3.33 million.  […]

Where is cybersecurity in 2020 and where are we heading?

At the start of 2020, smart businesses were already preparing their security practices against threats including ransomware and phishing. That was before the pandemic, which has resulted in a shift in traditional working practices and a significant rise in remote working this year that has introduced the possibility of additional security risks. Paul Colwell (pictured), […]

Escaping from Data Lockdown with a Digital Evolution

With data amassing at an exponential rate, digital transformation continues to be throttled as businesses struggle to achieve the insight they need from the data. To achieve value from data, businesses need to be able to access what they need, when they need, by the right people, in a usable format. Peter Ruffley, CEO, Zizo, has […]

LogRhythm NextGen SIEM Platform – Build your security program on a solid foundation

By LogRhythm Align your team, technology, and processes to see broadly across your IT and operating environments, uncover threats, and minimise risk — all within a single, unified platform. The LogRhythm NextGen SIEM Platform is at the centre of thousands of SOCs worldwide. Detect threats earlier and faster. When it comes to stopping threats, seconds matter. That’s […]

The state of the security team: Are executives the problem?

By LogRhythm A global survey of security professionals and executives by LogRhythm Amid a slew of statistics on how job stress is impacting security professionals, we sought to learn the causes of the tension and anxiety — as well understand potential ways teams might alleviate and remediate the potential of job burnout.  We ran a […]

Joiner-Mover-Leaver process: Solve it once and for all?

By Tenfold Security JML processes give IT and HR departments regular headaches and often create quite hefty conflicts between those two departments. What is this all about? When a new employee joins your organization, HR will know about them first, as they sign the contracts and do the onboarding. Today, many employees will require IT […]

Why endpoint security matters more than ever

The swiftly evolving threat landscape, combined with the huge increase in remote working, means that securing your organisation’s endpoints has never been more critical. Here, George Glass, Head of Threat Intelligence at Redscan, explains the importance of endpoint security and why detecting and responding to the latest threats demands greater endpoint visibility and specialist expertise… […]

Identity Access Management vs. Access Rights Management – What’s the Difference?

The terms access management (short: AM; also referred to as access rights management or just rights management) and identity & access management (short: IAM) are often used synonymously. In practice, however, they do not stand for the same thing. In this article, we are going to take a closer look at the difference between access rights management software and identity/access management solutions. Check out the article at https://www.tenfold-security.com/en/identity-access-management-vs-permission-management-whats-the-difference/ If you are […]

Meeting the Tests to get out of Data Lockdown

Digital transformation of any business has always been hampered by making sense of underlying data. And that data has been growing in volume at an unprecedented rate driven by the growth of IoT. It’s the perfect storm – the need for real-time information being increasingly distanced by the rate at which the data volume is […]