Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Fostering the Next Generation of Cyber Security Professionals: A Grassroots Approach

Discover the potential of incorporating mandatory cyber security lessons in schools and the impact it could have on developing future experts in the field. Learn how countries like Israel are leading the way and why it's time for the UK to invest more in STEM education, including cyber security. Change the perception of the industry and inspire the next generation to become problem-solvers and solutions providers in the field.

The Importance of People in Cyber Security: A Process and Technology Perspective

In this video, we delve into the crucial role of people in cyber security. Following the people-process-technology approach, we discuss why having the right individuals in place within an organization is key. Learn how the skills of these individuals define your processes and how technology can aid in augmenting your efforts. Discover why the people element should always be the focus and why it's not always easy to find the right individuals when you need them. Join us in exploring the importance of people in cyber security.

The Business of Biometrics: Data Protection and Ethical Standards in Cyber Security

In this episode, I am joined by Chris Dawson and Iain Pye to talk about the biometric technology, what can be done to improve it, and how it might be utilised in the future. In this episode, we covered the following topics: We discuss biometrics and the security and management of the data collected, and how the data has been collected and used by the government, the military, and corporations. We also talk about the moral and legal issues of how biometric data is used and stored, and how individuals can be put at risk.

Ex-Military Cyber Security Experts: How Military Training Prepares You for Success in Cyber Security

Today we discuss recruiting in the cyber security field from a forces perspective - what to expect coming out of the military, recruiting people from the forces, and how we can bring people into this particular field to address the cyber security skills gap. In this episode, we cover.

The Secrets to a Successful Career in Cyber Security

In this video, I'm sharing with you the secrets to a successful career in cyber security. Cyber security is one of the fastest-growing sectors, and there are plenty of opportunities for skilled professionals. If you're interested in a career in cyber security, then you need to watch this video! I'll share with you everything you need to know to get started in this exciting field. From the basics of cyber security to what employers are looking for in a cyber security candidate, this video will help you build a successful career in cyber security.

The Cyber Security Skills Shortage

Whether you are training to become an information security professional or if you are more seasoned in the cyber security industry, this is an episode you don’t want to miss. In this episode, I am joined by Josh Davies and Keith Christie-Smith to talk about what the cyber security skills shortage means for the industry and how we can address this.

Threat Intelligence: Why Awareness is Critical, and Collaboration is Essential

Collecting information on cyber threats and analysing data on a regular basis is essential to ensure your defenses are tight and to allow you to pre-empt potential attacks. Richard Cassidy and Josh Davies, experts in the cyber threat intelligence field, join us today to discuss how collaboration between cyber professionals when it comes to data and intelligence is essential for keeping your environment secure in a world where threats evolve on a daily basis.

Organizations Already Have Your Personal Data For Their Campaigns

Richard Cassidy talks about data breaches in organizations and that some organizations already have your personal data. These organizations can launch campaigns that can affect core belief systems. Richard Cassidy has been consulting businesses on cybersecurity strategies and programs for more than two decades. During his career Richard has been heavily engaged in the design and implementation of infrastructure and cyber security solutions, helping organisations in evolving security, compliance, risk management, data assurance, automation, orchestration and breach response practices.