top of page
CYBER SNIPPETS
What you need to know for this week. Pillar brings you quick videos to ensure you have the insight and intelligence you need to protect your organization and its most valuable data assets.
Brought to you by experienced cyber security practitioners. Watch your email every Monday morning for your Monday Cyber Snippet.
Building Resilience
May 22
Cyber Security and AI
May 14
Supply Chain Risk
May 8
Maximize Protection Within Budget
April 16
How Do You Get Managed Security Right For Your Business?
March 27
Cyber security Intelligence for CISOs and security leaders
March 6
Cyber security Intelligence for CISOs and security leaders
Feb 13
Cyber security Intelligence for CISOs and security leaders
Jan 16
Cyber Security Intelligence for CISOs and Security Leaders
Dec 12
Cybersecurity Intelligence for Chief Information Security Officers
Nov 14
Election Integrity, Latest Vulnerabilities and More
System Hardening Best Pract
April 30
How to Interpret SOC2 Reports for Security
April 10
Get More, Spend Less In Cyber Security
March 20
Cyber security Intelligence for CISOs and security leaders
Feb 27
Cyber security Intelligence for CISOs and security leaders
Feb 6
Cyber security Intelligence for CISOs and security leaders
Jan 9
The Latest Data Leaks and Exploits
Dec 4
Cybersecurity Intelligence for Chief Information Security Officers
Nov 7
2023 Budget Considerations
Vulnerability Scans and Pen Testing
April 24
Find Hidden Security Risks with your Vendors
April 3
Virtual assistant Security
March 13
Cyber security Intelligence for CISOs and security leaders
Feb 20
Cyber security Intelligence for CISOs and security leaders
Jan 30
Cyber security Intelligence for CISOs and security leaders
Dec 19
Ransomware Attacks on School Systems and Recommendations for Parents
Nov 21
Cybersecurity Intelligence for Chief Information Security Officers
Oct 30
Trending Threats & Current Intelligence
Oct 23
Current Key Threats
Oct 3
Securing Your Cloud Environment Part 2
Sep 12
Cyber Insurance Readiness Part 3
Aug 8
Business Emergency Preparedness Planning
July 18
Security Reporting to the Executive Team
June 13
Compliance does not Equal Security in Cybersecurity
May 16
Threat Hunting
April 25
Cyber Insurance Challenges?
April 4
Managing Third Party Risk Part 2
March 14
Cyber Warfare?
Feb 22
Oct 17
Oct 10
Ransomware Response Planning
Sep 26
The Importance of Threat Intelligence
Sep 19
Securing Your Cloud Environment Part 1
Aug 29
Cyber Insurance Readiness Part 4
Aug 15
Cyber Insurance Readiness Part 2
Aug 1
Mobile Application Security Testing
July 11
Understanding SIEM, SIM and Log Management pt.2
June 6
Cyber Insurance Readiness Part 1
July 25
Mobile Device Data Protection
June 20
Understanding SIEM, SIM and Log Management pt.1
May 22
Foundations for a Cyber-safe Culture
May 9
Security Leadership and Communication
May 2
Vulnerability Management
April 18
The Importance of Budgeting for Cyber Security
April 11
Managing Third Party Risk Part 4
March 28
Managing Third Party Risk Part 1
March 7
Managing Third Party Risk Part 3
March 21
Specific Threats from Russia and How to Defend your Enviroment
Feb 28
Vulnerability Management
Feb 14
Ransomeware Response
Feb 7
bottom of page