Cyber security all stars: Meet the experts shaping the future at ITC Cyber Peak 2024
Cyber threats are outpacing traditional defences, leaving organisations vulnerable. How can businesses stay ahead? At ITC Cyber Peak 2024, we’re bringing together a diverse team of experts to tackle this challenge head-on. On 26 September 2024, these industry leaders will share invaluable insights that embody our theme, “Cyber Security: A Team Game,” offering a holistic […]
Why cyber security is the ultimate team sport
In today’s digital battlefield, cyber attacks aren’t just increasing in frequency—they’re evolving at an alarming rate. As a cyber security leader, you’re not just fighting off threats; you’re racing against time, budget constraints, and the ever-expanding attack surface of your organisation. The harsh reality? Traditional, siloed approaches to cyber security are falling short. Consider this: […]
DORA compliance: a roadmap for financial institutions (Part 2)
In the previous blog, we discussed the urgency of Digital Operational Resilience Act (DORA) compliance, the common challenges organisations face, and how ITC’s unique capabilities and integrated delivery model make us a trusted partner in achieving cyber resilience. In this second part, we will delve into the specific steps organisations can take to navigate the […]
DORA compliance: navigating the path to cyber resilience (Part 1)
The Digital Operational Resilience Act (DORA) is set to revolutionise the way financial institutions approach cyber security and risk management. As the threat landscape continues to evolve, with increasingly sophisticated attacks targeting the financial sector, DORA provides a comprehensive framework to bolster operational resilience and protect against ICT disruptions. While the official implementation date is […]
THREAT HORIZON – RegreSSHion – CVE-2024-6378
Executive Summary A new security vulnerability has been discovered in OpenSSH’s server (sshd); a common software used on Linux systems for secure communication. This issue is specific to Red Hat Enterprise Linux (RHEL) 9 and does not affect RHEL 8. The vulnerability could potentially allow attackers to crash the server or, in more severe cases, […]
[Webinar] Unlocking the power of generative AI
Generative Artificial Intelligence (gen AI) is rapidly reshaping the business landscape. Its accessibility, ubiquity, and transformative potential make it a game-changer for organisations worldwide. But how can your organisation harness this power effectively? Join our upcoming webinar to explore the fundamentals of gen AI in security and discover how it can revolutionise your workflows. Agenda: Opening […]
[Webinar] Unlocking the power of generative AI
Generative Artificial Intelligence (gen AI) is rapidly reshaping the business landscape. Its accessibility, ubiquity, and transformative potential make it a game-changer for organisations worldwide. But how can your organisation harness this power effectively? Join our upcoming webinar to explore the fundamentals of gen AI in security and discover how it can revolutionise your workflows. Agenda: Opening […]
Striking the perfect balance: Seamless security and exceptional user experience in identity and access management
In today’s era of distributed and digital actors, the traditional network perimeter by itself is no longer enough to protect company resources and services. This has led to identity and access management (IAM) stepping to the frontline, underpinning the entire Zero Trust proposition to defend against an evolving landscape of cyber threats. When security revolves […]
Streamline your joiner, mover & leaver processes
The joiner, mover, leaver (JML) lifecycle is a critical component for most organisations. However, provisioning access rights for users through each stage of the lifecycle securely and efficiently is a complexity still faced by many. This webinar will demonstrate how you can simplify the complexity with the automation capabilities of Microsoft across Cloud, Entra, Azure […]
[Webinar] Streamline your joiner, mover & leaver processes
The joiner, mover, leaver (JML) lifecycle is a critical component for most organisations. However, provisioning access rights for users through each stage of the lifecycle securely and efficiently is a complexity still faced by many. This webinar will demonstrate how you can simplify the complexity with the automation capabilities of Microsoft across Cloud, Entra, Azure […]