Register

1
2

White Papers

Security at the Speed of DevOps

View More

Expanding to international markets with cloud communications

View More

Security Debt? - Hindsight is 2020

View More

Death of the firewall - does it have a place in 2021?

View More

Securing a Borderless Enterprise

View More

What you can’t see will hurt you: Do you have all the information you need to protect your organisation?

View More

Why 2021 could take ransomware to new heights

View More

Delivering a 360 trusted customer experience in real time

View More

Minimising risk from cyber threats: Focus on reducing time to containment.

View More

Evolution or Revolution - How do you avoid “we’ve always done it this way”?

View More

Can IT really be an innovation centre?

View More

Modern IAM: Making the Business and Security Case

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

View More

How to bridge the islands of security that expose your network to ongoing risk

View More

How to stop an attack before it stops you.

View More

New Risks in a Transformed World - why VPN isn't the answer

View More

Not every cloud has a silver lining.

View More

The future of Customer Experience & Digital Onboarding

View More

Top priorities in today’s security climate

View More

AI and ML in security operations: the propaganda of AI

View More

Protecting Business-Critical Applications from Increasing Risks

View More

Security challenges in a ‘Working from Home’ environment – exploring new attack surfaces from the hacker point of view

View More

How fast is your IT department?

View More

Why all these vulnerabilities don't matter

View More

Death of the Firewall – does it have a purpose in 2020?

View More

Cyber Risk and Resilience

View More

Working from Home - exploring new attack surfaces from the hacker point of view

View More

Security Analytics at the Speed of Search

View More

Enabling Digital Transformation Through CIAM

View More

Collaboration, co-creation and co-design How are IT and customer leaders finding opportunities by connected thinking?

View More

How Covid Changed The Security Landscape

View More

Remote working and the challenges of Covid

View More

Could the Google Genie be Answering the CISOs’ Wishes?

View More

Pulling Our SOCs Up - Optimising Performance through Evolution

View More

Security at the Speed of DevOps

View More

Cutting the Phishing Line - Defending Customers Against Phishing

View More

4 Tips for Security Awareness Behavior Change

View More

Best Practice PitsStop

View More

Duress as a Threat - Human Aspects of defence

View More

How Do You Create a Security ‘Green Cross Code?’

View More

When the Screens Went Black

View More

Who Dares Wins - Lessons in Resilience & Performance

View More

Recruitment Hacks for Cyber Teams

View More

Rebuilding After NotPetya - Lessons from Maersk

View More

6 Key Factors for Driving Performance & Diversity in Cyber Teams

View More

Developing into a Special Cyber Forces Team

View More

The Security Awareness Holy Grail – Have You Found It Yet?

View More

7 Tips for Optimising Your Cyber Insurance

View More

Transforming Security Networks Operations with Automation

View More

Attitude First, Aptitude Follows: Plugging the Cyber Talent Gap

View More

GDPR - One Year On - Lessons Learnt

View More

What is Reasonable? Cyber – Are You on the Right Side of the Law?

View More

How Deep Have You Dug Your Security Foundations?

View More

We're All Individuals! I'm Not! Engaging the Human in Cyber Security

View More

How Not to Be a Victim of Digital Darwinism

View More

Project Management – The Security Blindspot

View More

Standing at the Edge with IoT

View More

The Missing Link – Evolving Security Awareness Training for Business Survival

View More

The Risk Management Space-Time Continuum

View More

5 Ways CISOs can Build a Better Security Business Case

View More

The AI Revolution & The Dawn of a New Ecosystem

View More

Data & Digital Transformation: Lost in Translation for Business Leaders?

View More

Why Security ‘Awareness’ isn’t Enough – Embedding a Proactive Security Culture

View More

Learning from CyberCrime’s Not So Subtle Art of Advantage

View More

Cyber Leaders: “This is Our Watch…”

View More

Skills Shortage – or Development Void?

View More

Don’t Tell Anyone but …Are the Metrics Wrong?

View More

Gaining greater influence with the board by knowing what they want

View More

Security as a Business Enabler

View More

CIGA Accelerates Claims Processing

View More

Increase business velocity with fast, secure data management

View More

Subscribe to be the first to know about our launch and special events