News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Victoria Windsor
Victoria Windsor
Moderator, Infosecurity Magazine
Destination Boston! The Journey so Far
Blog
31 August 2017
How to Access Finance for your Cyber Security Start-up or Scale-Up
Webinar
15:00 —
16:00, 28 June 2016
Cutting Through the Hyperbole: What the IoT Really Means for Enterprise Cyber Security
Webinar
15:00 —
16:00, 28 March 2016
What’s It Really Like to be a CISO?
Webinar
16:00 —
17:00, 24 November 2015
Intelligent Defence: Collaborative Strategies to Defend Against the Latest Vulnerabilities, Risks and Threats
Webinar
15:00 —
16:00, 28 April 2015
Response and Recovery: Minimising the Impact of an Incident Through Cyber Resilience
Webinar
15:00 —
16:00, 14 April 2015
Intelligent Security: Balancing Information Security Risks and Priorities
Webinar
15:00 —
16:00, 31 March 2015
Implementing Resilient Cybersecurity Incident Detection and Response
Webinar
15:00 —
16:00, 11 November 2014
Mitigating the Social Engineering Threat
Webinar
15:00 —
16:00, 10 November 2014
Protecting sensitive data in the cloud: New approaches to mitigate database security risk
Webinar
15:00 —
16:00, 21 August 2014
Insider Threat Kill Chain: Detecting Human Indicators Of Compromise
Webinar
15:00 —
16:00, 3 July 2014
Infosecurity Europe 2014: Experts Highlight Security as a Business Enabler and Preventing Cyberwar
Blog
22 May 2014
Defending the Modern Network from Targeted Attacks
Webinar
16:00 —
17:00, 1 August 2013
New approaches to effective SCADA cybersecurity
Webinar
19:00 —
20:00, 9 April 2013
Secure Collaboration for the Enterprise - sponsored by Axway & HP
Webinar
15:00 —
16:00, 6 December 2012
What’s Hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Chinese Ink Dragon Group Hides in European Government Networks
News
17 December 2025
1
North Korea Steals Over $2bn in Crypto in 2025
News
18 December 2025
2
New BeaverTail Malware Variant Linked to Lazarus Group
News
18 December 2025
3
React.js Hit by Maximum-Severity 'React2Shell' Vulnerability
News
5 December 2025
4
China-Linked Warp Panda Targets North American Firms in Espionage Campaign
News
5 December 2025
5
Russian Hacking Group Sandworm Deploys New Wiper Malware in Ukraine
News
7 November 2025
6
Critical PickleScan Vulnerabilities Expose AI Model Supply Chains
News
2 December 2025
1
Urban VPN Proxy Accused of Harvesting AI Chat Conversations
News
16 December 2025
2
Phishing Messages and Social Scams Flood Users Ahead of Christmas
News
16 December 2025
3
Asahi to Launch Cybersecurity Overhaul After Crippling Cyber-Attack
News
15 December 2025
4
OpenAI Enhances Defensive Models to Mitigate Cyber-Threats
News
11 December 2025
5
Malware Manipulates AI Detection in Latest npm Package Breach
News
1 December 2025
6
Revisiting CIA: Developing Your Security Strategy in the SaaS Shared Reality
Webinar
15:00 —
16:00, 11 December 2025
1
Exposing AI’s Blind Spots: Security vs Safety in the Age of Gen AI
Webinar
12:30 —
13:30, 13 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Cyber Defense in the Age of AI: Stay Ahead of Threats Without Compromising Safety
Webinar
15:00 —
16:00, 24 July 2025
4
Mastering Emerging Regulations: DORA, NIS2 and AI Act Compliance
Webinar
15:00 —
16:00, 17 July 2025
5
How Mid-Market Businesses Can Leverage Microsoft Security for Proactive Defenses
Webinar
15:00 —
16:00, 6 November 2025
6
Regulating AI: Where Should the Line Be Drawn?
Opinion
12 November 2025
1
What Is Vibe Coding? Collins’ Word of the Year Spotlights AI’s Role and Risks in Software
News Feature
11 November 2025
2
Risk-Based IT Compliance: The Case for Business-Driven Cyber Risk Quantification
Webinar
15:00 —
16:00, 23 October 2025
3
Bridging the Divide: Actionable Strategies to Secure Your SaaS Environments
Blog
7 November 2025
4
NCSC Set to Retire Web Check and Mail Check Tools
News
10 November 2025
5
Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations
Podcast
4 November 2025
6