News and Events

News

Be prepared: develop an effective cyber aware culture

In today's digital landscape, cybersecurity is crucial for every business. Discover how to develop an effective cyber aware culture that protects your organisation from sophisticated threats. Learn from industry experts about best practices in data protection, supply chain management, and fostering a security-conscious workforce. Don't miss out on essential tips to safeguard your business during Cybersecurity Awareness Month and beyond.
Read more »
a businessman in front of his desk facing the camera with people standing around him | ISO certification business benefits

Why the best businesses reap the benefits of ISO certification

Discover how ISO certification can transform your business. From boosting customer confidence to improving operational efficiency, ISO standards offer a myriad of benefits. Learn about the most popular ISO certifications and how they can give your company a competitive edge. Find out why the best
Read more »

Exposed Vulnerabilities: Building Resilient Supply Chains

Small businesses are crucial to supply chains, but their vulnerability to cybercrime poses significant risks. With 3.69 million UK small businesses experiencing cyber attacks in the past two years, building resilient supply chains is more important than ever. Risk Evolves' Helen Barge will address this
Read more »
person using mfa on smartphone in front of laptop | GDPR compliance cyber security

GDPR Compliance: Cyber security just got even more serious (if that was possible)

The Information Commissioner's Office (ICO) is taking a firm stance against companies that mishandle sensitive data. A recent £6.09m provisional fine highlights the critical importance of GDPR compliance and robust cyber security measures. Learn how businesses can protect themselves from cyber threats and potential ICO
Read more »

How to Ensure Supply Chain Trust: A Comprehensive Guide

In today's interconnected business world, ensuring supply chain trust is crucial. The recent CrowdStrike incident, which caused a global IT outage affecting Microsoft and countless businesses, highlights the critical importance of supplier reliability. This comprehensive guide explores key strategies for building trust in your supply
Read more »

Upcoming events

Subject Access Requests – What do I need to know?

Join us for our session on handling Subject Access Requests (SARs) and transform from a nervous novice into a confident SAR handler. Our expert, Anna Walters, will guide you through the essentials of managing SARs effectively.

Cyber Safe – But can I be sure?

Join us for "Cyber Safe: Essential InfoSec Practices for Everyone" and transform from a worried worker into a confident cyber defender. Our expert Phill Davies will guide you through practical steps to protect your personal and business data. Book your spot now and take control of your digital security!

Managing Risk – The Essentials

This IIRSM virtual course is designed to deliver a practical and engaging experience, using real-world case studies, short bursts of content delivery, video, interactive polls, and group discussions in break-out rooms.

Previous sessions

GDPR 101: Demystifying Data Privacy

This webinar provides an introduction to the General Data Protection Regulation (GDPR). We will cover the basics of data protection, key compliance requirements, and practical steps for businesses. Whether you are new to data privacy or need a refresher, this..

Mergers & Acquisitions: Your Guide to Business Matchmaking

'Always start with the end in mind` is advice often given to small businesses. If you're planning to sell your business or considering acquiring one, this webinar will guide you through the benefits of a robust compliance culture and key..

Supplier Security Essentials: Safeguarding Your Supply Chain

In this webinar, we will discuss how to assess supplier risks and implement effective security measures. You will also learn how to manage ongoing relationships to ensure your supply chain remains resilient and secure against potential threats...

SAR Secrets Unveiled: A Beginner’s Guide to Subject Access Requests

Learn about Subject Access Requests (SARs) in this informative session. We will explain what SARs are, why they are important, and how to manage them effectively. You will gain insights into the process, legal obligations, and best practices, ensuring you..

Beginners Guide to Sustainability

As climate concerns continue to shape the future of industries worldwide, understanding how to integrate sustainable practices into your organisation is more crucial than ever. In this session, we will delve into innovative strategies that businesses can adopt to make..

Cracking the Code: NIS2 & DORA Legislation Made Simple

Join our webinar to explore the latest developments in cybersecurity and digital operational resilience. We will explain the NIS2 and DORA legislation, detailing what these regulations mean for your business. Learn the necessary steps for compliance and discover how to..