Streamline your joiner, mover & leaver processes

The joiner, mover, leaver (JML) lifecycle is a critical component for most organisations. However, provisioning access rights for users through each stage of the lifecycle securely and efficiently is a complexity still faced by many.  This webinar will demonstrate how you can simplify the complexity with the automation capabilities of Microsoft across Cloud, Entra, Azure […]

ITC Cyber Summit 2024 – The Modern SOC in the Age of AI

Faster Future: Amplify Your Defences in the Age of AI Unlock the Future, Defend Today In a world where cyber security thrives on the synergy of people, processes, and tech, the rise of AI, phishing-as-a-service, and relentless adversaries begs the question: How can businesses supercharge their security game for optimal outcomes? Today, the modern enterprise […]

ITC Cyber Summit 2024 – Securing Identities in the Digital Realm

Faster Future: Amplify Your Defences in the Age of AI Unlock the Future, Defend Today In a world where cyber security thrives on the synergy of people, processes, and tech, the rise of AI, phishing-as-a-service, and relentless adversaries begs the question: How can businesses supercharge their security game for optimal outcomes? Today, the modern enterprise […]

ITC Cyber Summit 2024 – Managing Human Cyber Risk

Faster Future: Amplify Your Defences in the Age of AI Unlock the Future, Defend Today In a world where cyber security thrives on the synergy of people, processes, and tech, the rise of AI, phishing-as-a-service, and relentless adversaries begs the question: How can businesses supercharge their security game for optimal outcomes? Today, the modern enterprise […]

ITC Cyber Summit 2024 – The State of the Nation

Faster Future: Amplify Your Defences in the Age of AI Unlock the Future, Defend Today In a world where cyber security thrives on the synergy of people, processes, and tech, the rise of AI, phishing-as-a-service, and relentless adversaries begs the question: How can businesses supercharge their security game for optimal outcomes? Today, the modern enterprise […]

UPDATE: Log4Shell –CVE-2021-44228 –Apache Log4j Vulnerability

Priority: Critical Executive Summary: ITC Secure is continuing to monitor for any alerts that could indicate an incident related to the recent Log4J vulnerability. ITC have carried out threat hunting across the available log sources we ingest into Sentinel for signs of initial compromise and reviewed endpoint activity for suspicious process executions which would be […]