News and Events

News

DIY Privacy Policy: No Lawyer Required!

Have you ever wondered if or how you can create your own DIY privacy policy? Take a look as we uncover the what, where and why of a privacy policy and how you can put together your own without the need of a lawyer, and ensure GDPR compliance today!
Read more »
Navigating ISO 27001:2022: The Essential Transition Guide

Navigating ISO 27001:2022: The Essential Transition Guide

In the ever-evolving landscape of information security threats, organisations worldwide committed to safeguarding their data must adapt. This ISO 27001:2022 transition guide explores the crucial role the international standard for Information Security Management Systems (ISMS), ISO 27001, plays in achieving this objective. The release of

Read more »
Navigating the Intersection of AI, and PETs (Privacy Enhancing Technologies)

Navigating the Intersection of AI and PETs (Privacy Enhancing Technologies)

We’re not talking about robotic cats and dogs; we’re referring to the newly emerging technologies in generative artificial intelligence (AI) and privacy-enhancing technologies (PETs). Artificial Intelligence (AI) and Privacy Enhancing Technologies (PETs) have been high of the agenda in recent months for the Information Commissioner’s

Read more »
Chef with frown looking over prepared food |

We made the ISO 27001:2022 Transition – So What?

Hard on the heels of the success of our recertification audits for ISO 9001, ISO 27001, and ISO 27701 back in March, today we received confirmation that we have successfully completely our ISO 27001:2022 transition – the latest version of the information security standard. So

Read more »
Collaborative Meeting

Building a Strong Security Culture: Shared Responsibility for Effective Protection

Who is responsible for security culture in your company? Well, that would be the security team, I hear you cry! Whilst security teams and personnel are certainly part of the answer… they are not THE answer and if you rely solely on the security team

Read more »

Upcoming events

Managing Health & Safety Risks – The Essentials

This IIRSM virtual course provides non-health and safety professionals with an essential understanding of why they should and how they can proactively play their role in managing health and safety within their area of work.

The Unconventional Convention 2.0

The Unconventional Convention 2.0 is an engaging half-day workshop that uses virtual reality 'escape room' challenges to explore how different working styles can strengthen team dynamics. Created in collaboration with Coventry University's College of Arts & Humanities students, this innovative event invites business leaders and managers to participate in immersive problem-solving scenarios. Through hands-on VR experiences and guided discussions, participants will gain valuable insights into diverse behavioural approaches and their benefits to team performance.

Managing Risks – The Essentials

This IIRSM virtual course is designed to deliver a practical and engaging experience, using real-world case studies, short bursts of content delivery, video, interactive polls, and group discussions in break-out rooms.

Previous sessions

GDPR 101: Demystifying Data Privacy

This webinar provides an introduction to the General Data Protection Regulation (GDPR). We will cover the basics of data protection, key compliance requirements, and practical steps for businesses. Whether you are new to data privacy or need a refresher, this..

Mergers & Acquisitions: Your Guide to Business Matchmaking

'Always start with the end in mind` is advice often given to small businesses. If you're planning to sell your business or considering acquiring one, this webinar will guide you through the benefits of a robust compliance culture and key..

Supplier Security Essentials: Safeguarding Your Supply Chain

In this webinar, we will discuss how to assess supplier risks and implement effective security measures. You will also learn how to manage ongoing relationships to ensure your supply chain remains resilient and secure against potential threats...

SAR Secrets Unveiled: A Beginner’s Guide to Subject Access Requests

Learn about Subject Access Requests (SARs) in this informative session. We will explain what SARs are, why they are important, and how to manage them effectively. You will gain insights into the process, legal obligations, and best practices, ensuring you..

Beginners Guide to Sustainability

As climate concerns continue to shape the future of industries worldwide, understanding how to integrate sustainable practices into your organisation is more crucial than ever. In this session, we will delve into innovative strategies that businesses can adopt to make..

Cracking the Code: NIS2 & DORA Legislation Made Simple

Join our webinar to explore the latest developments in cybersecurity and digital operational resilience. We will explain the NIS2 and DORA legislation, detailing what these regulations mean for your business. Learn the necessary steps for compliance and discover how to..