Sponsored by Proofpoint

The Modern CISO’s Framework for Identifying, Classifying and Stopping Email Fraud

Sponsored by Abnormal Security

The Evolution of Ransomware: Victims, Threat Actors, and What to Expect in 2022

Sponsored by Sonatype

The Forrester Wave™: Software Composition Analysis, Q3 2021

Sponsored by Sonatype

How to Manage Open-Source Software Risks Using Software Composition Analysis

Sponsored by Sonatype

State of the 2021 Software Supply Chain

Sponsored by Jumio

How to Design Effective, Risk-Driven Onboarding Flows

Sponsored by Jumio

Anti-Money Laundering in 2022

Sponsored by Rapid7

Cloud & Kubernetes - Removing the Security Blind Spots

Sponsored by Rapid7

Shifting Cloud Security Left With Infrastructure as Code

Sponsored by Rapid7

Securing Kubernetes With InsightCloudSec

Sponsored by Rapid7

The Impact of XDR in the Modern SOC

Sponsored by Hitachi ID

An IAM & PAM Industry Guide to Ransomware: A Winning Defense with Zero Trust

Sponsored by Noname Security

Alissa Knight's: Hacking Banks & Cryptocurrency Exchanges Through Their APIs

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.