Videos

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4

Video Securing and Ensuring Data Sovereignty: Securing AI Episode 4 Series Overview Video Summary This video explores the growing integration of generative AI tools, such as ChatGPT, GitHub CoPilot, and Grammarly, within organisations, and how businesses can effectively manage and secure their use. The discussion highlights the challenges associated with AI’s data handling, particularly in […]

Securing and Ensuring Data Sovereignty: Securing AI – Episode 4 Read More »

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3

Video Securing and Ensuring Data Sovereignty: Control Insider Risk Episode 3 Series Overview Video Summary In this video, we walk through the process of managing user and device risk within an organisation, focusing on data protection and compliance requirements. The session highlights how contextual controls, device compliance, and behavioural analytics can work together to secure

Securing and Ensuring Data Sovereignty: Control Insider Risk – Episode 3 Read More »

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2

Video Securing and Ensuring Data Sovereignty: Data Movement Episode 2 Series Overview Video Summary In this video, we explore how Netskope’s advanced Data Loss Prevention (DLP) solution offers comprehensive security coverage across various channels, ensuring data is protected wherever it resides or moves. From web traffic to endpoints, email attachments, and cloud applications like OneDrive,

Securing and Ensuring Data Sovereignty: Data Movement – Episode 2 Read More »

Securing and Ensuring Data Sovereignty: Data Centre Access

Video Securing and Ensuring Data Sovereignty: Data Centre Access Episode 1 Series Overview Video Summary This video provides an in-depth look at Netskope Private Access (NPA) and how it enables Zero Trust Network Access (ZTNA) for secure, seamless remote access to private applications. Traditional VPNs often grant full network access, increasing security risks, whereas ZTNA

Securing and Ensuring Data Sovereignty: Data Centre Access Read More »

Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk

Video Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk Episode 2 Contact Us Video Summary This demo showcases real-time data streaming from Confluent into Splunk, using simulated water treatment sensor data along the River X. The dashboards provide an overview of treatment plants, river flow, and capacity levels, helping predict and mitigate overflow risks.

Simulating Real-Time Water Treatment Monitoring with Confluent and Splunk Read More »

Varonis Explained – 24/7 Threat Detection and Response

Video Varonis Explained – 24/7 Threat Detection and Response Episode 7 Series Overview Video Summary Varonis’ Managed Data Detection and Response (MDDR) service provides 24/7 protection, ensuring continuous coverage 365 days a year. This optional service combines Varonis’ award-winning threat detection capabilities with a dedicated team of cyber experts who investigate and respond to threats

Varonis Explained – 24/7 Threat Detection and Response Read More »

Splunk for Security: SSE – Security Data Journey – Episode 9

Video Splunk for Security: SSE – Security Data Journey Episode 9 Series Overview Video Summary This video introduces the Splunk Security Data Journey, a framework designed to guide organisations through six maturity stages of security operations using Splunk Security Essentials. Starting with Stage 1: Collection, it emphasises the importance of onboarding high-value data sources to

Splunk for Security: SSE – Security Data Journey – Episode 9 Read More »

Splunk for Security: SSE – Security Content – Episode 8

Video Splunk for Security: SSE – Security Content Episode 8 Series Overview Video Summary This video provides an in-depth look at the security content features within Splunk Security Essentials, showcasing how they help organisations explore and implement tailored use cases for their security needs. Starting from the Security Content page, users can navigate through six

Splunk for Security: SSE – Security Content – Episode 8 Read More »

Splunk for Security: SSE – Data Onboarding – Episode 7

Video Splunk for Security: SSE – Data Onboarding Episode 7 Series Overview Video Summary This video explores the data onboarding documentation features of Splunk Security Essentials, which provide detailed guides to streamline the process of integrating new data sources into Splunk. These guides address both the Splunk-side configurations and the vendor-side setup, ensuring a comprehensive

Splunk for Security: SSE – Data Onboarding – Episode 7 Read More »

Scroll to Top