- 36
- 2 146
Equilibrium Security Services Ltd
Приєднався 19 жов 2015
Shaping the Future of Cyber Security: Why Supporting Neurodiverse Talent Matters
In episode 13, Jessica Burden, a Security Engineer at IASME, joins host Anish to discuss why neurodiversity is a vital asset to Cyber Security. Diagnosed with autism at 14, Jessica’s journey inspired her mother to create IASME’s Neurodiverse Training programme, tailored for neurodiverse talent in Cyber Security. They explore Jessica’s experiences in the industry and what organisations can do to create a more inclusive environment-from rethinking interviews to ensuring neurodiverse professionals feel supported in their roles. Tune in for valuable insights into shaping a more innovative, diverse future in Cyber Security!
Переглядів: 39
Відео
Meeting Cyber Security Challenges in a Fast-Changing Digital World
Переглядів 89Місяць тому
In Episode 12, our host Anish is joined by Professor of Cyber Security Chitra Balakrishna to discuss the challenges of deploying new technologies while maintaining strong Cyber Security. They highlight the need for businesses to focus on core security principles-confidentiality, integrity, and availability-despite the complexities that new technologies like IoT and cloud services bring. The con...
The Compliance-Security Gap: Bridging Theory and Practice
Переглядів 534 місяці тому
In episode 11, join us for another insightful discussion with guest speaker, Claire Vandenbroecke, lead ISO 27001 auditor and Director of VandenSec Consulting. With her vast experience in compliance, this episode is essential viewing. Dive deep into the challenges that arise when compliance standards clash with the practical security needs of an organisation. Explore practical strategies to bri...
The Next Chapter ISO 27001: 2022's Impact on Corporate Security
Переглядів 1155 місяців тому
In the tenth installment of the Cyber Hot Seat, our host and managing director, Anish Chauhan, is joined by Claire Vandenbroecke, the Director of VandenSec Consulting. As a lead ISO 27001 auditor, Claire will guide us through the 2022 updates to the standard. Given her extensive expertise in compliance, this episode is a must-watch. We'll delve into the specifics of the recent changes, discuss ...
Combining Penetration Testing with Human Insight
Переглядів 286 місяців тому
Ever wonder if your penetration tests are missing something crucial? Let's face it, real attackers aren't just hacking your systems; they're targeting your team, often exploiting human error to find a way in. Join the MD of Equilibrium Security Anish Chauhan, to explore how blending traditional pen testing with real-world attack scenarios, like social engineering and phishing, gives you a compl...
Founding Partner Highlights: Equilibrium Security at the National Cyber Security Show
Переглядів 226 місяців тому
2024 was a standout year for Equilibrium Security as we marked our third year as founding partners of the National Cyber Security Show. This video highlights the best moments from the event, including valuable networking, insights from industry leaders, and a showcase of our services. We also added some fun with a sprinkle of magic from Mark Infiniti and a game featuring our octopus mascot. Tak...
Binary to Board: Translating Complex Concepts for Executive Decision Makers With Global CISO
Переглядів 547 місяців тому
In episode nine, our host and Managing Director, Anish Chauhan, is joined by CISO Jon Begley from a leading global travel retailer. Together, they discuss why it's crucial for security leaders to master the skill of simplifying complex security concepts for non-technical decision makers. Recognising that technical expertise alone isn't sufficient, they delve into the power of storytelling as a ...
Episode 8, Frontline Stories from a Global CISO: Navigating Incident Response in The Real World
Переглядів 938 місяців тому
In episode eight and the first video edition of the Cyber Hot Seat (check it out on our UA-cam Channel), our host and MD Anish Chauhan welcomes CISO Jon Begley from a leading global travel retailer. They discuss real-life incident response stories, demystify what 'incident response' truly entails in practice, and offer direct advice on preparing for cyber attacks. This episode provides clear, e...
Equilibrium Security Founding Partner at the National Cyber Security Show
Переглядів 38Рік тому
A snapshot of Equilibrium Security exhibiting at the NEC as a Founding Partner of the National Cyber Security Show.
Equilibrium joins the Decipher Cyber Jenny Platform
Переглядів 185Рік тому
We're delighted to announce that Equilibrium Security can now be found on Meet Jenny 🤖 Jenny is a Cyber Business Intelligence Platform that helps you to make informed, validated, and trusted decisions on security vendors. Check out our profile: deciphercyber.com/company/equilibrium-security
Are poor patching policies jeopardising your security?
Переглядів 303 роки тому
One of our key recommendations when we're writing penetration testing reports often concerns a patching process and the identification of vulnerabilities. Running ongoing vulnerability scans can be straightforward and by doing so a subsequent patching process and something that will automatically update becomes easy.
What is the difference between vulnerability scanning and penetration testing?
Переглядів 203 роки тому
Although there is a crossover between vulnerability scanning and penetration testing, they are two very different ways of testing the resilience of your IT infrastructure. The confusion between the two can become problematic if a business procures the wrong service. If you are unclear about which service your business needs, watch this short video to find out the difference.
Layered security in action
Переглядів 353 роки тому
We often talk to customers about a layered security strategy. But what exactly is ‘Layered Security’ - a term or buzz word that your hear a lot in the world of Cyber Security, but how does it work in practice?
Supply chain attacks - ensuring your suppliers are sufficiently protected to protect you
Переглядів 73 роки тому
A supply chain attack uses legitimate, trusted methods of communication to gain full access to a business’s inside, trusted networks. Supply chain attacks are difficult to detect because they happen outside of what would normally be considered the attack surface.
What is a 'risk register'?
Переглядів 63 роки тому
What is a risk register? We often find that most organisations implement a risk register only if they're mandated to do so by a regulatory or other compliance requirement. So what is a risk register and why should you implement one?
The top 4 Cyber Security blind spots (and how to overcome them)
Переглядів 283 роки тому
The top 4 Cyber Security blind spots (and how to overcome them)
Web application compromise - what types of attacks can occur and the effects on business
Переглядів 103 роки тому
Web application compromise - what types of attacks can occur and the effects on business
How to proactively hunt for cyber threats
Переглядів 63 роки тому
How to proactively hunt for cyber threats
How often should penetration tests be carried out?
Переглядів 343 роки тому
How often should penetration tests be carried out?
Covid19 Cyber Security Challenges BLS 720p new
Переглядів 214 роки тому
Covid19 Cyber Security Challenges BLS 720p new
The threat of third-party software applications.
Переглядів 804 роки тому
The threat of third-party software applications.
Fundamentals in Industrial Control Systems ICS Security webinar
Переглядів 745 років тому
Fundamentals in Industrial Control Systems ICS Security webinar
Webinar: GDPR How can vulnerability scanning help?
Переглядів 286 років тому
Webinar: GDPR How can vulnerability scanning help?
Cisco GDPR Podcast | Equilibrium Security
Переглядів 1476 років тому
Cisco GDPR Podcast | Equilibrium Security
Cisco Cloud Security Podcast | Equilibrium Security
Переглядів 666 років тому
Cisco Cloud Security Podcast | Equilibrium Security
Equilibrium Security's Cisco Umbrella Webinar
Переглядів 1107 років тому
Equilibrium Security's Cisco Umbrella Webinar