Cybersecurity and Information Resilience

Insights - August 2018 edition

Information and Cyber Challenges in the Public Sector

We recently carried out a survey to examine the robustness of the public sector against cyber-attacks and other threats to data security. Survey report highlights include:
  • 82% said data loss was their biggest single concern over the use of shadow IT
  • 68% said disaster recovery is a key requirement for cloud adoption
  • 57% don't know what security limitations are around Microsoft Office 365
Download now
rise in data breaches webinar

Webinar: The rise in data breaches

Under Article 33 of the GDPR, if your organization has a data breach you must notify the supervisory authority within 72 hours. With this in mind, prevention is better than cure. Join our webinar on Thursday, 6 Sept at 10am as we discuss the rise in data breaches and how to prepare for an incident as opposed to pay fines.
Register here
CEH training

Become a Certified Ethical Hacker

On this course you will learn ethical hacking and network security skills along with a crash course in GDPR. This is a practical course with hands-on lab experience so you can learn about the tools used by real attackers. You will have the opportunity to scan, test, hack and secure your own system to improve the resilience of your organization.
Book now
whitepaper - identity management

Whitepaper: The evolving and challenging landscape of identity management 

In 2017, identity fraud hit an all-time high of 175,000 incidents according to the Cifas’ National Fraud Database and the number continues to rise. This whitepaper discusses the difficulties encountered by consumers and organizations to protect against fraud and looks at the core principles of identity management in order to minimize the chance of identity theft.
Download now
Red teaming blog

Blog: Red teaming and the benefits to my business

Red teaming provides penetration testing and attack simulation to reflect a real-world attack scenario performed from a zero knowledge perspective. In our blog our in-house ethical hackers discuss what is involved in a red team assessment, the difference between red teaming and pen testing as well as the overall benefits to the organization in strengthening the security posture of your business. 
Read more

Upcoming courses

GDPR Auditor/Self-Assessment 22 - 23 Aug - London
06 - 07 Sept - Crewe
GDPR Implementer/Auditor 19 - 20 Sept - Dublin
GDPR Foundation 22 Aug - Dublin
4 Sept - London
14 Sept - Crewe
Certified Information Privacy Professional Europe (CIPP/E) 17 - 18 Sept - Dublin
19 - 20  Sept - London
Certified Information Systems Security Professional (CISSP) 17 - 21 Sept - Dublin
Certified Information Privacy Manager (CIPM) 19 - 20 Sept - Dublin
Certified Ethical Hacker (CEH) 10 - 14 Sept - Dublin
View all courses
...making excellence a habit.