NEWS
Cybersecurity – an ongoing challenge

Elizabeth Green, EMEA Advisory and Cyber Lead, at Dell Technologies, discusses the ever-shifting cybersecurity landscape, where cyber resilience is very much the focus.

Watch Online
NEWS
Sustainability – time for a revolution? Part 1

Pankaj Sharma, Schneider Electric's Global Executive Vice President, Secure Power Division, discusses the sustainability gap, with too many organisations talking up their environmental credentials, but failing to implement the necessary actions.

Watch Online
NEWS
Cybersecurity in the water industry

Glenn Warwick, Head of Operational Technology at Bridewell, discusses the findings of the company’s recent water industry cybersecurity report, highlighting where and how security improvements can be made in this critical national security sector.

Watch Online
NEWS
Fulfilling the promise of DevSecOps

Prashanth Nanjundappa, VP of Product Management, Progress, discusses the findings of the company’s recent DevSecOps report – the good news is that everyone recognises the benefits of combining DevOps and Security; however, many organisations have more work to do when it comes to putting in place the necessary collaboration, skills and management building blocks that are key to DevSecOps’ success.

Watch Online
NEWS
The HEAT is on when it comes to cybersecurity

Mark Guntrip, Senior Director, Cybersecurity Strategy at Menlo Security, discusses his company’s recent ransomware research report, highlighting the ways in which the cybercriminals are getting smarter, and outlining some of the ways in which end users can optimise a multi-layered cyber-defence strategy.

Watch Online
NEWS
Early warning system acts as cybersecurity ‘decoy’

Cesar Cid de Rivera, INTL VP of Systems Engineering at Commvault, discusses the cybersecurity landscape in depth, as well as outlining Commvault’s Metallic ThreatWise solution, an innovative approach to combatting the bad actors.

Watch Online
NEWS
A framework first approach for cybersecurity

Andrew Hollister, CISO at LogRhythm, discusses the findings of the company’s recent report, produced in association with Ponemon Institute – covering the current threat landscape, the need for clear communications between the CISO and the CEO/board level executives, and the importance of using a security framework to help build an optimised, end-to-end and resilient cybersecurity infrastructure.

Watch Online
NEWS
The importance of third party validation when it comes to cybersecurity

John Parlee, Chief Information Security Officer (CISO) at Park Place Technologies, discusses the importance of being able to demonstrate to customers, and employees, that your company recognises the importance of IT security, through a combination of standards, Zero Trust and, increasingly, cyber insurance.

Watch Online
NEWS
Security automation makes increasing sense

Leon Ward, VP of Product Management, ThreatQuotient, shares some early findings of the company’s ‘The State of Cybersecurity Automation 2022’ research report, which finds a dramatic increase in security automation activity, as well as highlighting the importance of managing expectations when it comes to implementation versus outcomes.

Watch Online
NEWS
Data sovereignty policies – public cloud or hybrid approach?

Paul Speciale, Chief Marketing Officer at Scality, discusses the results of the company’s recent data sovereignty survey, which found that, while the vast majority of companies have policies in place or have plans to do so, there’s a difference of opinion when it comes to relying on the public cloud alone or taking a hybrid approach when it comes to implementation.

Watch Online
NEWS
Cyber resilience – a better way to address cybersecurity?

Eric Herzog, CMO at Infinidat, suggests that organisations will have better success with their cybersecurity strategies if they embrace the wider, comprehensive idea of cyber resilience, with data protection and storage backup and recovery having a major role to play.

Watch Online
NEWS
OpenTDF Project promises data sharing security in a digital world

Matt Howard, SVP and Chief Marketing Officer at Virtru, provides some great insights into the Trusted Data Format (TDF) and explains why the time is right to launch the OpenTDF Project – giving the developer community the opportunity to address the many security complexities of the digital data ecosystem.

Watch Online
NEWS
Cybersecurity - distribution with a difference • Brigantia Partners

Angus Shaw, Sales Director at Brigantia Partners Limited, outlines the company’s unique approach to Value Added Distribution as it focuses on both consolidating and expanding its highly successful cybersecurity solutions portfolio, and its key vendor and Channel partner relationships.

Watch Online
NEWS
SDC Channel Summit promises valuable MSP insights

Conference Chair Ian Luckett outlines the content of the second virtual SDC Channel Summit event, taking place 10-11 May. A mixture of keynote presentations, roundtables and panel discussions promise to produce plenty of valuable insights for Channel companies dealing with the challenges and opportunities of digital transformation.

Watch Online
NEWS
Understanding and addressing Active Directory security issues

Mickey Bresman, Co-Founder and CEO and Ran Harel, Senior Security Product Manager, both at Semperis, discuss the findings of the company’s recent Microsoft Active Directory security survey, and also explain how the Semperis Purple Knight security assessment tool not only highlights AD security gaps, but also provides recommended fixes.

Watch Online

News

Cyber risk leader Quod Orbis launches inaugural report into the compliance capability of UK businesses.
Business Critical Solutions (BCS), the specialist business dedicated to optimising digital infrastructure across the globe, has started recruiting for this year’s apprenticeship programme and is looking for the next generation of Quantity Surveyors and Project Managers.
Managed Workspace Protection for Microsoft 365 Defender to block attacks and enhance security posture simply and quickly.
The solution will measure, monitor and manage all IT equipment and supporting infrastructure housed within its facilities.

Expert Opinions

By Rohit Bhosale, Persistent Systems.