Thank you to all our partners at the Summit in London on 23rd October. We could not run such an event without them. Included below are is a selection of […]
The following video is taken from our UK CISO Summit in London on 22nd October and features Matt Rider, VP Solutions Engineering EMEA at Exabeam. In the keynote titled ‘The […]
The following video is taken from our DACH Summit in Frankfurt on 9th September 2024 and features Felix Blanke, Senior Manager, Sales Engineering at Exabeam. In the keynote titled ‘The […]
Thank you to all our partners at the Summit in Frankfurt on 9th Sept. We could not run such an event without them. Included below are is a selection of […]
In the fast-evolving world of cybersecurity, the role of the Chief Information Security Officer (CISO) has become increasingly stressful, leading to a significant mental health crisis within this community. The pressures faced by CISOs are multifaceted, stemming from the need to defend against sophisticated cyber threats, manage team shortages, and maintain organizational security amidst constant digital transformation.
In this edition the UK Competition watchdog raises concerns over AI and the World Cybercrime Index reveals global hotspots.
The success of your security operations automation strategy depends on having all of the necessary data readily available so that threats can be prioritised and rapidly resolved but establishing a centralised source of enterprise visibility is no small order.
Ahead of their appearance at TLC Connect Global in Amsterdam, Exabeam have shared some materials to showcase their expertise and to demonstrate why our community should be excited to hear what they have to say…
Detecting and responding to threats is the primary objective of your security operations program, but as our environments spill over into myriad SaaS tools and other cloud environments, are these detection and response programs able to keep up?
With software supply chain attacks on the rise, organisations are struggling to detect, let alone prevent, these attacks. No one is immune to these mounting threats – so how do we move from vulnerability to victory?