Resources

New Whitepaper

IT Security within the Railways:

IT Security Front Cover

Current Threats and Future Challenges

The railways are one of the four main industries within the transport sector, the other three being shipping, aviation and road traffic.

Organisations within all these industries have plans to introduce new IT platforms and infrastructure to improve their operations and also make more services available to the public via apps.

Many of the plans involve innovative technologies that are only just emerging. The introduction of as yet untested technologies carries major IT security challenges, because new technology will always be a target for hackers.

If you would like to read more you can download the full paper here.

Previous Webinars & Whitepapers

Start-Up to IPO series - Episode 1

CLICK TO WATCH

WEBINAR

Episode 1 is now available to watch here.

In this episode we discussed what companies should be thinking about at each stage of their journey, and Stuart Jubb talked us through some key objectives that startups should be considering.

Sean Arrowsmith and Stuart Jubb both provided real life examples where some organisations have been held to ransom or indeed lost valuable data through security breaches.

The next webinar in our series ‘Startup to IPO’ is on the 20th October and if you wish to register you can here.

Diversity, Equality and Inclusion in Workplace

Click to watch Diversity Webinar with Tom Ilube

WEBINAR

During this Webinar, Tom Ilube talks candidly to Stuart Jubb about his experiences as a black man navigating the UKs tech industry, why diversity in tech really matters in the age of algorithms and what practical and positive steps British tech firms can take.

 

You can view the webinar here

LIVE DEMO Credential Stuffing Attack

Click to watch LIVE DEMO

WEBINAR

Here we present a demo of a credential stuffing attack which will allow professionals to visualize important metrics.  We also suggest ideas for protection mechanisms to detect and prevent this popular form of attack.

Presenters:  Jan Broniowski, Senior Software Architect and Alan Lim, Senior Penetration Tester at Crossword Cybersecurity PLC
You can view the webinar here

Anatomy of a Credential Stuffing Attack

CREDENTIAL STUFFING ATTACK

WEBINAR

A hacker perspective: step-by-step guide and presentation of attack tools used by hackers.
Learn what a credential stuffing attack is, and why it is so popular and what companies are usually targeted.

James Henry one of our Consulting Directors, Alan Lim a Penetration tester and Jan Broniowski from our development team discuss credential stuffing and how hackers go about using these techniques.

You can view the webinar here

Future Gazing - How does a CISO budget/plan for three years time?

CLICK TO WATCH (1)

WEBINAR

It can be tempting to just focus on the immediate challenges forced onto companies due to COVID-19, but Cyber practitioners who are able to balance the ‘Tactical’ decisions today, with strategic thinking, will be those who weather this storm with the most success.

This panel session will explore this question from the viewpoint of a number of ex CISOs but also looking far into the future from the perspective of academia. You will hear the viewpoint from industry as well as the horizons of leading academic research.

You can view the webinar here

Future Gazing - Written Edition

Screenshot 2020-10-05 at 15.05.15

WHITEPAPER

Written overview of the ‘Future Gazing’ Webinar.

One of the questions we are frequently asked, is ‘what placeholders should I be allocating some of my budget to in Year 3,’ or what are the future technology trends I should be thinking about.

You can download your copy here