In 20 minutes we'll demystify cyber-security trends, shine a light on end-customer challenges and introduce you to leading technologies who offer a solution. With each session you can expect a new topic explained by a leader from the cyber-security world.

Browse upcoming and on demand webinars or simply sign up to be the first to hear when the next episode is available.

Quantifying the Threat to our Digital Identities:

Findings from the F5 Labs 2023 Identity Threat Report 

This session summarises a year-long research project analysing 320 billion web and mobile requests directed at nearly 160 businesses over 12 months. We'll reveal the prevalence of credential stuffing attacks, examine attacker preferences, and detail tactics used.
Additionally, we'll discuss the evolution of phishing techniques, especially in overcoming multi factor authentication. Case studies will illustrate distinctions between basic and advanced attacks, and we'll evaluate the stolen credential supply chain, concluding with mitigation strategies against credential stuffing.

Join us to learn: 

  • How much credential stuffing affects your industry 
  • The focus for attackers and the tricks they use to hide their activity 
  • New phishing strategies and MFA bypass techniques 
  • Effective methods to combat the growing threat of identity based attacks 
.

Bitsight's evolution to Cyber Risk Management from Security Ratings

Bitsight pioneered the security ratings space in 2011 and this year they re-branded to focus their efforts on delivering cyber risk management for their customers.

Supply chain attacks are at an all time high and they have the best in class third party risk management tools to deliver continuous vendor monitoring and vendor risk management. In addition to the increased supply chain attacks, regulations are also coming into force with DORA and NIS2 both on the horizon for many sectors in the UK and EU. Carlos will will discuss all of the Bitsight offerings at a high level and show our partners how their platform can help them reduce their customers risk exposure.
.

Thales Talk OneWelcome Identity Platform (CIAM)

Thales are here to talk to you about the hot topic of Customer Identity and Access Management (CIAM). Their platform will empower you to connect and protect digital consumer identities across your B2B ecosystem. In 20 minutes eXpert Martin Otten will cover the typical challenges the OneWelcome Identity Platform can help solve and explore the opportunity for channel partners.
.

You can't manage what you can't see!


Bitsight will demonstrate how organisations can bridge the gap between lack of visibility to exposure to understanding and prioritising cyber risk. Your partners need to provide the right security solution to enhance business opportunities for their customers and now they can.

Gain a competitive advantage by offering executive reports that showcases potential risk exposure. Want to learn more?
.

The Unprecedented Change in Endpoint Security. All You Need To Know About EDR, MDR, XDR & EPP

What's driving the change in endpoint security? Where has endpoint security evolved from? Where are we today? Join us in breaking down the acronyms (EDR, MDR, XDR & EPP), and helping you help your customers understand where to focus.
.