ON-DEMAND WEBINARS
SOC-IT-2-ME
Webinar Series
SOC-IT-2-ME SUMMIT
Get the Knowledge to Begin the Ascent to Compliance
These flash sessions cover:
Session 1: All things SOC 2: Why it’s becoming the global information security standard
Session 2: SaaS best security practices
Session 3: SOC 2 – The Fast Track
Session 4: Q & A
SOC 2 Type 2: How to Prepare for the Audit
This webinar will cover:
- The steps to get ready
- Selecting the Trust Service Criteria
- The importance of control mapping
- Never ask a question you don’t know the answer to – the first rule of surviving the audit: evidence
- A typical timeline
- Interactive Q&A
SOC 1, 2 or 3 – Know the Difference
This webinar covers:
- What is SOC?
- What is the difference between SOC 1, 2 & 3?
- What are the types of reports for each?
- What are the 5 Trust Service Principles?
- Which SOC is right for your organisation?
- What are the commercial benefits of compliance?
- Interactive Q&A
DATA PROTECTION & PRIVACY
Webinar Series
Conducting DPIAs: The Key to Unlocking Data Protection Compliance
What’s a data impact assessment? When should I conduct one and why? What is the value of my compliance efforts?
Join this webinar to get these answers and the opportunity to ask your other pressing questions surrounding the unsung DPIA tool – that is the key to DPA and GDPR compliance.
What Data Flow Mapping Looks Like and How to Start
Both UK Data Protection Act 2018 and GDPR compliance require that organisations document how the personal data they process is transferred from one location to another. It is also the first critical step in conducting a DPIA to identify and address the associated security risks in this process. Our Data Protection Sage (and Amateur Brewer) Andy Whitaker provides practical advice and gives a demonstration on how to get this done.
How to Conduct a Data Privacy Impact Assessment (DPIA)
What is a Data Privacy Impact Assessment? When do you need to conduct one? Join us for this pragmatic and informative webinar hosted by our Data Privacy & Protection expert, Ursula Baye. Ursula discusses the goals and objectives of this critical data protection requirement. She walks you through a simple step-by-step demonstration of how to conduct a DPIA followed by a question and answer session.
How to Implement Data Protection by Design & Default
Do you understand the principle of Data Protection by Design & Default? Does your organisation adhere to this much over-looked data protection requirement? Watch this useful, straightforward webinar hosted by our Data Privacy & Protection expert, Andy Whitaker. Andy discusses the goals and objectives of this essential principle and provides some practical advice for ensuring it’s included in your data protection programme.
Data Protection: What Constitutes ‘Evidence of Compliance?’
Are you compliant to GDPR & DPA 2018? How do you know? Can you prove it?
This practical webinar is hosted by our Data Privacy & Protection expert, Andy Whitaker. Andy discusses the use of key performance indicators to implement and monitor in order to ensure you can demonstrate compliance.
Holistic Security Testing in the New Threat Landscape
Ever wanted to know what Holistic Security testing involves and how it can help create a strong defence against the evolving cyber threat landscape?
Download this webinar hosted by Geoffrey Bougnague and Richard Hollis. Stay tuned for the last 15 minutes, when they open the floor to attendees for security testing questions.
How to Protect Against Your Biggest Threat – People
Did you know that human error caused 90% of UK data breaches in 2019, according to the ICO?
Download this webinar and find out how to mitigate this imminent threat with current best practices and training methods for the workplace – whether that is in the office or at home. Plus, you’ll get insight from a security testing expert who will take you through three social engineering attacks to perform on your staff to identify vulnerabilities.
How to Optimise Your Security Penetration Testing
Do you want some practical advice on how to get a better return on your security penetration testing investment?
Download this webinar to hear from our penetration testing expert, Richard Hollis discussing how you can receive full benefits from your penetration testing.
Be sure to stay tuned for an interactive questions and answers session at the end.
7 Things to Include in your Testing Supplier’s SLA
A security penetration testing service is too critical to leave anything to chance. Get it in writing.
Download this webinar hosted by, Geoffrey Bougnague for 7 key things to ensure to include in your testing provider’s service level agreement.
Plus, get your free copy of our complimentary Service Level Agreement Checklist!
CYBER ESSENTIALS SERIES
Webinar Series
Achieving Cyber Essentials Plus
Join us for this webinar, hosted by our CE experts who will discuss the benefits of achieving Cyber Essentials Plus and provide 5 tips on how to attain this valuable cyber security certification. You’ll also get an in-depth insight into how to prepare for the audit process and manage timeframes from our CE certifying assessor. The webinar will be followed by a question and answer session.
Achieving Cyber Essentials Plus
Join us for this webinar, hosted by our CE experts who will discuss the benefits of achieving Cyber Essentials Plus and provide 5 tips on how to attain this valuable cyber security certification. You’ll also get an in-depth insight into how to prepare for the audit process and manage timeframes from our CE certifying assessor. The webinar will be followed by a question and answer session.