Which superpowers does a security hero need to have?Take the quiz
Test your knowledge on the essentials you need to become your business' security superhero
As digital services become increasingly vital to enterprises, the attack surface that IT needs to defend continues to widen. To do that, every business needs a security superhero. Take this quiz to test how well prepared you are to lead your business to security success.Take the quiz
What you'll learn
What elements of security should IT take control of
Benefits of an organisation-wide security approach
How to test the effectiveness of your systems & processes
Become a security heroTest your knowledge
Investing in the future – Proact’s support of GCU’s SOC
Euan Birch, Security Operations Lead at Proact UK It isn’t often that I feel nervous. I’m generally very good at...
The Nightmare Before Christmas in a Cyber Age
Faye Morton, Marketing Copywriter at Proact UK Most of us know about the misadventures of Jack Skellington, Halloweentown’s beloved Pumpkin...
Cyber warfare: Targeting national infrastructure
Euan Birch, Security Operations Lead at Proact UK The water we drink, the train we get to work, the hospital...
What does a cyber attack really look like?
Tim Simons, UK Security Product Manager at Proact We often get asked what cyber attacks really look like and it’s...
Privileged access management – protecting the keys
Jason Lucas, Security Consultant at Proact UK For years organisations protected their crown jewels – their data – by building...
Email phishing: Why do we still get hooked?
Lara Huddless, Sales Enablement Coordinator at Proact UK We all know about phishing attacks. They’re not new, in fact they’ve...
Cyber warfare: Setting cyber rules in the wild world
Euan Birch, Security Operations Lead at Proact UK Humans have been at war for 92% of the past 3,400 years....
Public Wi-Fi, evil twins and the men in the middle
Tim Simons, UK Security Product Manager at Proact Public Wi-Fi is everywhere – airports, trains, cafes, hotels – and we...
Mapping a trail towards the security maturity summit
Define a path to tackle the uphill challenge of planning & benchmarking your security journey, including measuring progress
Conquering your security Everest
Understand what a mature security approach looks like and the various stages you need to conduct across your organisation to get there
Is data your attacker’s advantage or yours?
Here we discuss how SIEM systems can be used to gain access to & analyse key information to create predictive models for future cyber attack patterns