10th November 2026
Hilton London Canary Wharf
10th November 2026
Hilton London Canary Wharf
Days
Hours
Minutes

Save £35k by deleting emails from your CEO

You work in finance. You get an email from your CEO addressing you by your first name, apologising for the late Friday email, but requesting you make an urgent payment to a regular supplier, with account details helpfully provided in the email. You’d pay it, right? CEO fraud is an increasingly common type of phishing […]

FREE GUIDE: How to reduce the security vulnerabilities in Office 365

You’re likely to follow the path of least resistance, attacking wherever you have the biggest chance of success on the most widely used programs. You will put out Phishing emails, Malware attacks, simple extortion mailers and Business Email compromise (BEC) attacks to gain entry to the target system. Many enterprise organisations’ SaaS technology of choice […]

The Rising Email Threat: Are instant messaging tools the answer?

By Barracuda Networks At Barracuda we believe two heads are better than one. Following that logic, we can’t argue the value of the opportunity to hear from our peers on industry trends. We recently discovered through such means that, for the channel, email security is its biggest focus in 2019, as partners are increasingly helping their customers fight […]

More than half of companies have over 1,000 exposed sensitive files

By Matt Lock (pictured), Director of Sales Engineers UK, Varonis All an attacker needs to steal your valuable data is access. Unfortunately, many companies unknowingly give attackers access to their critical data. Personal identifying information on employees and customers, intellectual property, and more can easily make their way from secured systems to unprotected files and […]

Could your most trusted employee be your biggest threat?

95% of cyber security breaches are due to human error, which in reality means it could be any user, at any time. The best bit? They probably won’t even know they’re doing something wrong, but they have inadvertently just become an unintentional insider threat. As Andy Pearch, Head of IA Services, CORVID, explains, organisations need to stop playing […]

Cybersecurity’s biggest asset: Why use the cloud?

The cloud is one of those hot buzzwords that gets thrown around a lot both in the tech world and in our daily lives. No longer reserved for IT departments alone, the cloud has become something that we depend upon greatly, especially in the way companies go about their business. And it’s about to become […]

Cybersecurity and Financial Services – How Can Organisations Combat the Threat?

By Genevra Champion, Sector Marketing Manager, IT Governance The financial services industry is naturally a lucrative target for cyber criminals. Financial organisations trade and control vast amounts of money, as well as collect and store customers’ personal information so clearly, a data breach could be disastrous for an industry that is built on trust with its customers.  The financial services industry is […]

Shadow IT is everywhere – are you at risk?

By EveryCloud Cloud services – SaaS and IaaS – are everywhere. Businesses rely on their flexibility and the productivity they deliver. But what about the cloud services you don’t see? Business-led cloud services, or “Shadow IT”, have sprung up in dozens of departments and project teams. In every corner of the business and outside the […]

Evolving mobile device management strategies

By Dom Hume, VP Product & Technical Services,  Becrypt As organisations continue to innovate to realise efficiencies through the use of increasingly sophisticated and pervasive mobile technologies, many are continually challenged by the risks associated with managing an ever growing device estate. Successfully managing the complexity of multiple software and hardware mobile platforms necessitates a […]

WEBINAR: 6 Critical Steps for Securing Office 365, Thursday 9th May at 10am BST

Microsoft Office 365 continues to be the most used cloud-based application adopted by organisations worldwide. As a popular productivity suite, its capabilities are broad and help users collaborate with people both inside and outside their organisation.  A broad set of capabilities, however, creates challenges in accessing and protecting the data that is used across the […]