News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Victoria Windsor
Victoria Windsor
Moderator, Infosecurity Magazine
Destination Boston! The Journey so Far
Blog
31 Aug 2017
How to Access Finance for your Cyber Security Start-up or Scale-Up
Webinar
28 Jun 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
28 Mar 2016
What’s It Really Like to be a CISO?
Webinar
24 Nov 2015
Intelligent Defence: Collaborative Strategies to Defend Against the Latest Vulnerabilities, Risks and Threats
Webinar
28 Apr 2015
Response and Recovery: Minimising the Impact of an Incident Through Cyber Resilience
Webinar
14 Apr 2015
Intelligent Security: Balancing Information Security Risks and Priorities
Webinar
31 Mar 2015
Implementing Resilient Cybersecurity Incident Detection and Response
Webinar
11 Nov 2014
Mitigating the Social Engineering Threat
Webinar
10 Nov 2014
Protecting sensitive data in the cloud: New approaches to mitigate database security risk
Webinar
21 Aug 2014
Insider Threat Kill Chain: Detecting Human Indicators Of Compromise
Webinar
3 Jul 2014
Infosecurity Europe 2014: Experts Highlight Security as a Business Enabler and Preventing Cyberwar
Blog
22 May 2014
Defending the Modern Network from Targeted Attacks
Webinar
1 Aug 2013
New approaches to effective SCADA cybersecurity
Webinar
9 Apr 2013
Secure Collaboration for the Enterprise - sponsored by Axway & HP
Webinar
6 Dec 2012
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Top 10 Cyber-Attacks of 2023
News Feature
12 Dec 2023
1
French Employment Agency Data Breach Could Affect 43 Million People
News
14 Mar 2024
2
HSE Misconfiguration Exposed Over a Million Irish Citizens’ Vaccine Status
News
15 Mar 2024
3
US Government to Investigate Change Healthcare Ransomware Attack
News
14 Mar 2024
4
Over 700 Dark Web Ads Offer DDoS Attacks Via IoT in 2023
News
22 Sep 2023
5
How to Backup and Restore Database in SQL Server
Blog
27 Mar 2023
6
NIST National Vulnerability Database Disruption Sees CVE Enrichment on Hold
News
15 Mar 2024
1
Cyber Pros Turn to Cybercrime as Salaries Stagnate
News
6 Mar 2024
2
US Intelligence Predicts Upcoming Cyber Threats for 2024
News
12 Mar 2024
3
NSA Launches Top 10 Cloud Security Mitigation Strategies
News
11 Mar 2024
4
Adapting to Tomorrow's Threat Landscape: AI's Role in Cybersecurity and Security Operations in 2024
Webinar
28 Mar 2024, 15:00 GMT , 11:00 EDT
5
Overcoming the AI Privacy Predicament
Opinion
8 Mar 2024
6
Enabling Incident Response in a Remote Working Landscape
Webinar
19 Nov 2020
1
Phishing, Impersonation, and Beyond: CISO Insights on 2023-2024 External Threats
Webinar
15 Feb 2024
2
How to Navigate the Evolving DDoS Attack Landscape
Webinar
14 Mar 2024
3
CISOs Redefined: External Threats, A Catalyst for Holistic Cybersecurity in 2024
Webinar
22 Feb 2024
4
Better Together: Reducing Risk and Minimizing Exposures to Exploitable Internet Targets
Webinar
21 Feb 2024
5
Mastering Software Supply Chain Security with Strategic Defense Mechanisms
Webinar
30 Nov 2023
6
Infosecurity Magazine Spring Online Summit 2024: Day One
Online Summit
09:45 GMT, 19 Mar
–
15:00 GMT, 20 Mar 2024
1
Infosecurity Magazine Spring Online Summit 2024: Day Two
Online Summit
10:45
–
16:00 EDT, 20 Mar 2024
2
Russia’s Midnight Blizzard Accesses Microsoft Source Code
News
11 Mar 2024
3
I-Soon GitHub Leak: What Cyber Experts Learned About Chinese Cyber Espionage
News Feature
27 Feb 2024
4
LockBit Takedown: What You Need to Know about Operation Cronos
News
26 Feb 2024
5
Women in Cybersecurity at Infosecurity Europe 2024
Magazine Event
16:00 PDT, 4 Jun 2024
6