Complimentary webinars and seminar sessions summarising cyber defence and information risks and solutions available in today's landscape.
Our webinars and seminar days are devised to summarise and put into context the current threat landscape affecting all organisations within the UK. They are specifically designed to keep you up to date with what is going on in the industry, potential risks to be aware of, and solutions that can be applied.
Professional Webinars include:
|Access Rights Management Webinar|
Join us for a 45 minute WebEx to discover the power of 8MAN. 8MAN addresses the fundamental flaws in the traditional approach to user-provisioning, access rights and permissions, effectively bridging the gap between IT and business units (data owners).
|Admin & Privilege Account Management Webinar|
Privileged account passwords for domain admin accounts, root accounts, and super-user accounts are the preferred targets for hackers these days.
|Advanced Threat Protection (ATP) Webinar|
Join us for an informative 60 minute WebEx and discover Symantec Advanced Threat Protection. SAP combines global telemetry, and cloud based analytics from one of the world's largest cyber intelligence networks (the largest non-state military) with local customer context across endpoints, networks and email, to uncover attacks that would otherwise evade detection.
|Clearswift DLP For Beginners Guide|
From physical security of printed information such as printed board papers and computer systems, through to blanket information encryption in various forms and then to content aware DLP, it can feel like a minefield.
|Cloud-Based Vulnerability Management Webinar|
Join us for a 45 minute webinar to introduce this new Tenable cloud-based platform. With increasing threats and a constantly changing IT landscape, it's more challenging than ever to keep up with identifying vulnerabilities and, more importantly, fix them
|Cyber Essentials Scheme Webinar|
We recognise that not everyone has the necessary resources to address the business-critical issue of cyber security. Join us for an informative 30 minute WebEx to introduce you to the Cyber Essentials Scheme.
|Cyber Security Threats Explained|
Watch a short 3 minute video on what CST has to say about cyber security threats and what we are seeing out in the industry today.
|Endpoint Management & Security Suite Webinar|
Join us for a 1 hour WebEx to discover how EMSS can work in your environment to offer 'Total Endpoint Security'
|IT Shadow Risk Assessment|
Register for the shadow IT risk assessment by Symantec to analyse your Cloud security vulnerabilities. You can also request a 45 minute webinar to discover how Symantec DLP and CASB can safeguard your entire data estate - wherever itís stored.
|Information Protection Webinar|
Join us for a 45 minute WebEx to discover, secure and manage your critical information. Access to organisation's critical information has never been more prolific, with or without malicious intent; via the increased adoption of the internet, web tools and the automation of commercial operations via collaboration tools such as email, web, social media and IM.
|Ivanti Patch for Endpoint Manager Webinar|
Enable comprehensive patch management across your enterprise with Ivanti Patch for Endpoint Manager
|Netwrix Auditor Product Demo Webinar|
Netwrix Auditor is an agentless platform for structured and unstructured data security. Join us for a live product demo to learn how to stay in control of your sensitive data and the answers you need on your active directory.
|Security Information and Event Management Webinar|
Are you 100% sure that you would know that your organisation had been breached, would you know if you were being attacked? Could you quickly understand how, when and where?
|Symantec Endpoint Protection Webinar|
Join us for an informative 60 minute WebEx to introduce the key features and technologies that make Symantec Endpoint Protection 14 a game changing approach to endpoint security.
|Symantec Web Security Service Webinar|
See the webinar demonstration for Symantec WSS. Allows user to access web resources and be protected from Cyber risks, as well as enforcing policies about how staff are permitted to access the Web.