“The NHS budget is finite, and it doesn’t stretch far enough for security.” Protecting critical infrastructure without the budget to do so? That’s the reality for many public sector InfoSec teams.
Sensitive data moves in and out of your organization every day. But how do you know when routine becomes risky? With Charlotte AI Agentic Workflows, CrowdStrike helps you fast-track the hunt for suspicious file activity—so you don’t have to. From after-hours uploads to unsanctioned cloud storage, Charlotte AI helps you analyze file movement across your environment. By reviewing Falcon Data Protection events, applying a foundational model, and generating a structured, actionable report, this demo shows how agentic automation brings clarity to chaos—no log diving required.
In this series, we chat with cybersecurity and data resilience leaders from Kroll and our partners. Our second guest is Denyl Green, Managing Director in the Cyber Risk business, based in Portland. Future episodes will cover topics such as the Cyber Threat Landscape, AI Risk Governance, and Breach Notification.
Watch how a global travel company transformed their insider threat management with Teramind. In this RSA Conference 2025 case study, Teramind's VP of Product, David Pinckard, and arrivia's Executive Director of Revenue Integrity & Fraud, Justin Skagen, reveal how to: Move from reactive to proactive threat detection Streamline fraud investigations Manage human-driven security risks at scale Discover how leading organizations address the most unpredictable challenge in cybersecurity: insider threats.
Card fraud is escalating at an alarming rate, with no signs of slowing down. In a world where digital payments have become the norm, almost everyone, consumers, businesses, and financial institutions, finds themselves at risk. The convenience of card payments has made them an essential part of daily life, but it has also paved the way for sophisticated fraud schemes. For businesses, the stakes are even higher.
Japan is the latest country to shift from a reactive to a proactive cybersecurity stance, with its landmark Active Cyber Defense Law. The new regulations passed in May 2025 and are set to take full effect by 2027. For cybersecurity leaders, particularly those in critical infrastructure and the enterprise sector, this legislation marks a turning point—and carries major implications about how we test, validate, and evolve our cyber defenses.
K-12 cybersecurity for school districts is more critical than ever in 2025. With limited resources, increased reliance on digital tools, and the sensitive nature of student data, school districts have become prime targets for cybercriminals. As threats evolve and regulations tighten, it’s essential for school administrators and IT teams to understand the cybersecurity landscape, identify key risks, and take action.
Just-in-Time (JIT) access and Just Enough Privilege (JEP) are important security practices to ensure secure access management. In this short video, learn their key differences and how they enhance organizational security.