channel company logo

Cyber Management Alliance

View our exclusive "Insights with Cyber Leaders Series" and webinars

Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring
for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by indust
  • 14,234 Subscribers
  • 87 talks

View our exclusive "Insights with Cyber Leaders Series" and webinars

Cyber Management Alliance presents an exciting series of interviews with International Cyber Security Leaders. Want to know what they look for when hiring
for their teams? Want to know the secrets to their success and what keeps them awake at night? Theses exclusive interviews are presented by indust
  • 14,234 Subscribers
  • 87 talks

On-demand talks

Live workshop: Creating a Cyber Incident Response Plan

Live workshop: Creating a Cyber Incident Response Plan

New and stringent guidelines on Incident Reporting and the ever-rising threat of cyber crime has made Incident Response a top priority for almost everyone.
But while others seem to articulate the importance of an IR Plan with impressive lucidity and talk of how useful their template is, are you struggling to even
get started? Do you feel your organisation and you are still lagging behind in bringing an effective IR plan to life? If your answer is yes, then you’ve come t…

NCSC-Certified Cyber Incident Planning and Response Training Course

NCSC-Certified Cyber Incident Planning and Response Training Course

Cyber Management Alliance is the creator of the globally-renowned NCSC-Certified Cyber Incident Planning & Response course. This training, created by
experts, can help you improve your organisational cyber resilience & your ability to respond to a cyber-attack. Understand your organisational threat
landscape & enhance your ability to respond to those threats and risks with our NCSC-certified Cyber Incident Planning & Response training course. Reduce …

What You Don’t Know About FACEBOOK’s Outage

What You Don’t Know About FACEBOOK’s Outage

Join us to as we untangle the reality behind one of most intriguing outages in recent history. Even if you were in a cave and under a rock in the cave in the
middle of nowhere, there is no doubt you would have heard about the Facebook outage. Almost SIX hours of NO Facebook, Instagram and WhatsApp meant
that a significant portion of humanity suddenly had a massive amount of time for their families. Jokes aside, the outage cost FB a lot. Conservative estimat…

What Really Happened in the SolarWinds Cyber-attack?

What Really Happened in the SolarWinds Cyber-attack?

What makes this attack so unique and pervasive? What does the attack methodology look like when we piece it all together? These are the questions we’ve
all been seeking answers to as a community. Staying true to its commitment of continuously building educational resources for the community, Cyber
Management Alliance is embarking on a journey to unpack the hidden lessons in Solorigate. Join IronNet's Joel Bork and Cyber Management Alliance's Am…

How to Modernize the SOC with Autonomic Security Operations

How to Modernize the SOC with Autonomic Security Operations

For most enterprises, the Security Operations Center (SOC) has never been able to keep up with the speed of innovation. The cloud transformation has
further exacerbated the gap between what attackers see and what defenders know. Customers across the board have shared the challenges – - Too many
vendors, data sources, alerts, and false positives - A never-ending talent shortage and lack of cloud expertise - The rise of ransomware and highly capable …

Cloud Adoption & Migration: Making Security a Priority in your Strategy

Cloud Adoption & Migration: Making Security a Priority in your Strategy

Whether you are migrating workloads to the cloud or developing new applications, securing multiple assets follows much the same path. You must consider
management of access and connectivity as well as demonstrate an adherence to multiple directives – whether compliance or business mandates. Without full
visibility of all possible controls, it is difficult to completely understand connectivity and access risks both at the perimeter and “inside” the cloud. As Cloud a…

How to Break Automatic Policy Enforcement in Network Security

How to Break Automatic Policy Enforcement in Network Security

4 facts you need to know. - Misconfigurations are a major root cause of cyber-attacks. - Manual changes within complex infrastructure often lead to these
misconfigurations. - Compound that with emergency changes made during critical events, a major contributor to misconfigurations and cyber-attacks. - Your
current security policies are being breached regularly and its humanly impossible to enforce those policy violations without automation. For increased cert…

Managing the Weakest Link in the Cyber Attack Workflow

Managing the Weakest Link in the Cyber Attack Workflow

The good attackers are really lazy, but in a good way! They automate every possible activity to ensure an error free successful attack, and one of the steps
they automate is discovery. They need an entry point to your organisation, and they are constantly scanning the internet for that one open door to get in.
The question is: Are you continuously scanning the internet to discover the doors you have open before the attackers do? Attack Surface Management is th…