Register

1
2

White Papers

Whitepaper | From Vulnerability to Victory: Mastering Next-Gen Tactics to Thwart Software Supply Chain Attacks

View More

Whitepaper | Extortionists are upping their game, are you keeping up?

View More

eBook | Scaling Up from Cyber Security to Cyber Resiliency

View More

eBook | Threat Intelligence - Know Your Enemy, Know Yourself

View More

Whitepaper | Mastering Cloud Security: Sharing Responsibility in the Face of Growing 3rd Party Risks

View More

Whitepaper | The Human Element of Cyber Security

View More

Whitepaper | Why Frictionless Customer Authentication Matters

View More

Whitepaper | The 3 R's - Delivering Relevant, Resilient, and Reliable Digital Services

View More

Whitepaper | GNSS/GPS and the Automotive Sector – What does the future hold?

View More

Whitepaper | Scaling Up from Cyber Security to Cyber Resiliency

View More

Whitepaper | Why invest in 5G - What are the compelling use cases emerging for 5G?

View More

Whitepaper | Re-Architecting the Enterprise: The Role of Real-Time Data

View More

Whitepaper | Digital Business: winning technology strategies for your industry

View More

Whitepaper | Exploring the Need for Cloud Email Security

View More

Whitepaper | Deploying, securing, and connecting apps across hybrid clouds

View More

If it isn’t actionable, does it even matter?

View More

Ransomware: Are Your Defenders Keeping Up With The Extortionists?

View More

Choosing the Right Email Security Platform

View More

The Realities of Innovating in the Cloud | part 2

View More

How to run a successful IAM project

View More

Data Protection for the Information Economy: The Data Awareness Challenge

View More

Reducing Business Risk: Securing Privileged Access and Implementing a Zero Trust Strategy

View More

Automatically Increase Engagement, Solve Issues, and Identify Unmet Needs Within the Customer Journey

View More

Protecting Your Apps and APIs For a Better Customer Experience

View More

Informed Decisions for Securing Your Information Lifecycle

View More

What Brands are Getting Wrong About Customer Authentication

View More

Ransomware: The Security Debt Collector

View More

How to Future-Proof your IoT Security

View More

Key Considerations for Choosing the Right Email Security Platform

View More

The Realities of Innovating in the Cloud

View More

The Branch of One – Delivering Optimal Digital Experiences to a Hybrid Workforce

View More

An authentication authority for a centralised and trusted single source of identity

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem | Part 2

View More

How the Parcel Surge Impacts Your Business

View More

Cyberattacks are on the rise, are you ready to recover maliciously compromised data?

View More

Your Role in Securing Data in Cloud Applications

View More

What brands get wrong about customer authentication

View More

Creating value from unstructured language data: building better products with NLP

View More

Hybrid cloud - is it the future or just the next technology buzzword?

View More

Steps to Delivering Relevant, Resilient, and Reliable Digital Services

View More

The challenges of cloud adoption - can you become agile and maintain momentum whilst remaining secure?

View More

The challenges and opportunities of the ‘New Enterprise Reality’

View More

Why you’ll never get to Zero Trust with weak authentication

View More

Optimising the Human Element of Cyber Security

View More

2021 End-User Computing State of the Market

View More

Where’s the Sec in Mobile DevOps?

View More

Rebalance your cyber security with a “prevention-first” strategy

View More

How CIOs can gain data superpowers to manage data pipelines in the face of real time decisions

View More

Security Debt, Running With Scissors

View More

Simplify Customer Onboarding and Reduce Fraud with Identity Verification

View More

Identity and Access Management as the Foundation of the Modern Enterprise

View More

The Power of Data - The Critical Enabler of Faster Decision Making

View More

Rethinking Security as a Business Enabler

View More

Creating order out of chaos: natural language as a strategic imperative

View More

Leave no-one behind: how to unlock your entire digital ecosystem

View More

Jump ahead of the competition with passwordless access for your staff and customers | part 1

View More

How would your business recover from a cyberattack?

View More

Lost value in customer frustration

View More

Is Your Enterprise Effective at Preventing Cyber attacks as your Employees Work from Home?

View More

Best practices for building customer 360 initiatives that earn customers for life

View More

TLC TV Episode 4: The Ripple Effect

View More

Embracing the Cloud for “Innovation at Scale”

View More

Modern DLP – Why Traditional Approaches Won’t Solve Insider Threat Problems

View More

Is Identity the Cornerstone of Every Good Security Model? How Do You Compare?

View More

Restoring Critical Business Services as Quickly as your Competitors

View More

Cybersecurity Incident Response – how do we stop attacks before they stop us? | Part 2

View More

Are passwords leading us towards a security crisis?

View More

Ransomware: Getting to know the enemy

View More

Driving your competitive advantage with Cloud-first Identity and Access Management | Part 2

View More

Cybersecurity Incident Response – how do we stop attacks before they stop us? | Part 1

View More

Ransomware: The extortionists have upped their game, are your defenders keeping up?

View More

Driving your competitive advantage with Cloud-first Identity and Access Management (AIM) | Part 1

View More

Igniting Continuous Business Transformation

View More

Security at the speed of DevOps | October

View More

Customer IAM from myth to mastery | 20th July

View More

Identity as the New Perimeter

View More

The Ecosystem is the Threat: Best Practices to Enable Mission Critical Cybersecurity | July 7th

View More

Rethinking application security in the API-first era

View More

An interview with Martin Davies, Principal Consultant, Sungard Availability Services

View More

Operating Global Dev Teams: Sharing Regional Insights

View More

The ‘Sec’ in the DevSecOps Journey | 6 July

View More

Customer IAM: from myths to mastery

View More

Security at the speed of devops | July 30th

View More

The ‘Sec’ in the DevSecOps Journey

View More

The Rise and Risks of SaaS Applications

View More

Security Debt? Hindsight is 2020 | July ANZ

View More

Why managing vendor risks is an essential part of your security program | June 23rd

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management | June 15th

View More

Security at the speed of DevOps | June 9th

View More

Zero Trust: Good Idea But What’s Next? | June 9th

View More

Sharing Best Practice to Quantify Security Performance

View More

How do we stop attacks before they stop us?

View More

Security Debt? Hindsight is 2020 | July

View More

Why managing vendor risks is an essential part of your security program

View More

TLC TV Episode 3: Reimagining the Customer Experience

View More

How to maximize revenue through connected customer experiences

View More

Analytics strategy versus culture. A match made in heaven or in hell?

View More

Identity as the New Perimeter

View More

Defining a secure and flexible path to data-centric SASE

View More

Zero Trust Access for the Hybrid Workforce

View More

Security at the speed of DevOps | July

View More

Why Disaster Recovery Plans often fail. How long can your company survive without its data?

View More

Switch from post-mortems to pre-mortems. Respond to incidents before they occur.

View More

Customer IAM: from myths to mastery

View More

Succeeding with Operational Resiliency in a New Era

View More

On-Line Privacy, Security and a Seamless Patient Experience

View More

Tackling the Grey IT Dilemma

View More

Reimagining Customer Experience: Realise Results and Deliver Business Value

View More

TLC TV: Serious tech made fun. Episode 1 - Evolution of Endpoint Security

View More

DevSecOps at scale for digital innovation

View More

Zero Trust: Good idea but what’s next?

View More

Switch from post-mortems to pre-mortems. Respond to incidents before they occur.

View More

If you can’t measure it, you can’t improve it. Best practices to quantify security performance.

View More

The Future of Customer Engagement

View More

Is the Ecosystem the threat?

View More

Scalable, adaptable, digital: aligning people, process and tech to business strategy

View More

A cyber secure future: are we doing enough

View More

Secure Digital Transformation: A single privacy framework to reduce risk and create value

View More

Addressing advanced cyber threats with a small security team

View More

Managing vendor risk: an essential part of security

View More

Why managing vendor risks is an essential part of your security program

View More

Security at the Speed of DevOps

View More

Expanding to international markets with cloud communications

View More

Security Debt? - Hindsight is 2020

View More

Death of the firewall - does it have a place in 2021?

View More

Securing a Borderless Enterprise

View More

What you can’t see will hurt you: Do you have all the information you need to protect your organisation?

View More

Why 2021 could take ransomware to new heights

View More

Delivering a 360 trusted customer experience in real time

View More

Minimising risk from cyber threats: Focus on reducing time to containment.

View More

Evolution or Revolution - How do you avoid “we’ve always done it this way”?

View More

Can IT really be an innovation centre?

View More

Modern IAM: Making the Business and Security Case

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

View More

How to bridge the islands of security that expose your network to ongoing risk

View More

How to stop an attack before it stops you.

View More

New Risks in a Transformed World - why VPN isn't the answer

View More

Not every cloud has a silver lining.

View More

The future of Customer Experience & Digital Onboarding

View More

Top priorities in today’s security climate

View More

AI and ML in security operations: the propaganda of AI

View More

Protecting Business-Critical Applications from Increasing Risks

View More

Security challenges in a ‘Working from Home’ environment – exploring new attack surfaces from the hacker point of view

View More

How fast is your IT department?

View More

Why all these vulnerabilities don't matter

View More

Death of the Firewall – does it have a purpose in 2020?

View More

Cyber Risk and Resilience

View More

Working from Home - exploring new attack surfaces from the hacker point of view

View More

Security Analytics at the Speed of Search

View More

Enabling Digital Transformation Through CIAM

View More

Collaboration, co-creation and co-design How are IT and customer leaders finding opportunities by connected thinking?

View More

How Covid Changed The Security Landscape

View More

Remote working and the challenges of Covid

View More

Could the Google Genie be Answering the CISOs’ Wishes?

View More

Pulling Our SOCs Up - Optimising Performance through Evolution

View More

Security at the Speed of DevOps

View More

Cutting the Phishing Line - Defending Customers Against Phishing

View More

4 Tips for Security Awareness Behavior Change

View More

Best Practice PitsStop

View More

Duress as a Threat - Human Aspects of defence

View More

How Do You Create a Security ‘Green Cross Code?’

View More

When the Screens Went Black

View More

Who Dares Wins - Lessons in Resilience & Performance

View More

Recruitment Hacks for Cyber Teams

View More

Rebuilding After NotPetya - Lessons from Maersk

View More

6 Key Factors for Driving Performance & Diversity in Cyber Teams

View More

Developing into a Special Cyber Forces Team

View More

The Security Awareness Holy Grail – Have You Found It Yet?

View More

7 Tips for Optimising Your Cyber Insurance

View More

Transforming Security Networks Operations with Automation

View More

Attitude First, Aptitude Follows: Plugging the Cyber Talent Gap

View More

GDPR - One Year On - Lessons Learnt

View More

What is Reasonable? Cyber – Are You on the Right Side of the Law?

View More

How Deep Have You Dug Your Security Foundations?

View More

We're All Individuals! I'm Not! Engaging the Human in Cyber Security

View More

How Not to Be a Victim of Digital Darwinism

View More

Project Management – The Security Blindspot

View More

Standing at the Edge with IoT

View More

The Missing Link – Evolving Security Awareness Training for Business Survival

View More

The Risk Management Space-Time Continuum

View More

5 Ways CISOs can Build a Better Security Business Case

View More

The AI Revolution & The Dawn of a New Ecosystem

View More

Data & Digital Transformation: Lost in Translation for Business Leaders?

View More

Why Security ‘Awareness’ isn’t Enough – Embedding a Proactive Security Culture

View More

Learning from CyberCrime’s Not So Subtle Art of Advantage

View More

Cyber Leaders: “This is Our Watch…”

View More

Skills Shortage – or Development Void?

View More

Don’t Tell Anyone but …Are the Metrics Wrong?

View More

Gaining greater influence with the board by knowing what they want

View More

Security as a Business Enabler

View More

CIGA Accelerates Claims Processing

View More

Increase business velocity with fast, secure data management

View More

Subscribe to be the first to know about our launch and special events