SERVICE

Free Posture Assessment

Assess Your Defences. Find Your Weak Spots.

Our free Posture Assessment, guided by a CyberLab expert, identifies gaps across ten critical areas aligned with NCSC best practice for UK SMEs. Get clear, actionable insights to reduce risk and build resilience – starting today.

Book Free Consultation

Episode 1: Risk Management

Gavin Wood, CEO at CyberLab, joins Adam Gleeson to discuss the key considerations businesses need to have when creating and implementing a risk management plan.

They cover:

  • Identify potential risks to your business
  • Effectively prioritise these risks
  • Implement control measures to mitigate risk
View Webpage

Episode 2: Engagement and Training

Jack Smallpage, ISO at CyberLab, and Colin Aitkenhead, Consultant at CyberLab, join the series as they discuss how organisations can build cyber security that works for your people.

They cover:

  • The risk businesses face from their people
  • How to create a positive cyber security culture
  • Preparing our people for cyber attacks
View Webpage

Episode 3: Asset Management

Andrew Noonan, Systems Engineering Director at Forescout discusses everything you need to know about asset management to protect your organisation.

They cover:

  • What is asset management and why is it important?
  • How to effectively implement asset management
  • What to do with the asset information
View Webpage

Episode 4: Vulnerability Management

Andrew Walker, Digital Account Director at CyberLab, and David Dixon, Security Testing Consultant at CyberLab, discuss how to identify, assess, prioritise and mitigate security vulnerabilities.

They cover:

  • What is vulnerability management and why is it important?
  • Mitigating the risk from legacy systems
  • Security testing and automation
View Webpage

Episode 5: Data Security

Adam Hartley, Senior Sales Engineer at Forcepoint, joins the cyber security video series to discuss how organisations can implement comprehensive measures to protect data from unauthorised access, modification, or deletion.

They cover:

  • What data security is and why it is important?
  • Data Security in Practice: implementing an effective data security strategy
View Webpage

Episode 6: Incident Management

Jonathon Hope, Senior Technology Evangelist at Sophos, joins the 10 Steps to Cyber Security Series for a deep dive into incident management and how organisations can better prepare for cyber incidents.

They cover:

  • What is incident management is and why it is important?
  • Incident management in practice: protecting your data and securing your organisation
View Webpage

Episode 7: Logging and Monitoring

Kostandino Kustas, Cyber Security Consultant at Sophos, and Matthew Rhodes, Regional Sales Director MSP & Strategic Accounts at Logpoint, join the 10 Steps to Cyber Security Series for a deep dive into cyber security logging and monitoring.

They cover:

  • Defining logging and monitoring and the role it plays in modern cyber security
  • Logging and monitoring in practice: how to protect your data and secure your organisation
View Webpage

Episode 8: Architecture and Configuration

Peter Morris, Systems Engineer at Cisco, and Lucian Coman, Technical Presales Consultant at TD Synnex join the Cyber Security Video Series to deep dive into how organisations can reduce risk through Architecture and Configuration.

They cover:

  • Creating systems that get security right from the start
  • Managing systems securely, and maintaining security over time
View Webpage

Episode 9: Identity and Access Management

James Pascoe, Technical Architect at Chess ICT, joins the Cyber Security Video Series to explore the key role that identity and access management plays in securing data and devices within an organisation.

They cover:

  • What is identity and access management?
  • Managing access to systems and devices securely
View Webpage

Episode 10: Supply Chain Security

Paul Crumpton, Partner Services Manager at IASME joins the 10 Steps to Cyber Security Video Series to deep dive into Supply Chain Security.

This episode covers:

  • What is Supply Chain Security and why is it so important?
  • Understanding and securing your supply chain
  • Practical advice and implementation tips
View Webpage

E-BOOK

10 Steps to Cyber Security

The Ultimate Cyber Security Guide

This eBook explores the 10 Steps to Cyber Security framework developed by the National Cyber Security Centre (NCSC) and how to keep your data secure, and your organisation protected.

Download E-Book
HackRisk Logo White

What is YourHackRisk Score?

Introducing HackRisk from CyberLab

Your early warning system for cyber security risks AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.

Dark Web Scanning
Vulnerability Scanning
Recon Scanning
Supply Chain Security
Get Free HackRisk ReportTour The Platform

Speak With an Expert

Enter your details and one of our experts will be in touch.

Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.

Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.

We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.