SERVICE
Free Posture Assessment
Assess Your Defences. Find Your Weak Spots.
Our free Posture Assessment, guided by a CyberLab expert, identifies gaps across ten critical areas aligned with NCSC best practice for UK SMEs. Get clear, actionable insights to reduce risk and build resilience – starting today.
Episode 1: Risk Management
Gavin Wood, CEO at CyberLab, joins Adam Gleeson to discuss the key considerations businesses need to have when creating and implementing a risk management plan.
They cover:
- Identify potential risks to your business
- Effectively prioritise these risks
- Implement control measures to mitigate risk
Episode 2: Engagement and Training
Jack Smallpage, ISO at CyberLab, and Colin Aitkenhead, Consultant at CyberLab, join the series as they discuss how organisations can build cyber security that works for your people.
They cover:
- The risk businesses face from their people
- How to create a positive cyber security culture
- Preparing our people for cyber attacks
Episode 3: Asset Management
Andrew Noonan, Systems Engineering Director at Forescout discusses everything you need to know about asset management to protect your organisation.
They cover:
- What is asset management and why is it important?
- How to effectively implement asset management
- What to do with the asset information
Episode 4: Vulnerability Management
Andrew Walker, Digital Account Director at CyberLab, and David Dixon, Security Testing Consultant at CyberLab, discuss how to identify, assess, prioritise and mitigate security vulnerabilities.
They cover:
- What is vulnerability management and why is it important?
- Mitigating the risk from legacy systems
- Security testing and automation
Episode 5: Data Security
Adam Hartley, Senior Sales Engineer at Forcepoint, joins the cyber security video series to discuss how organisations can implement comprehensive measures to protect data from unauthorised access, modification, or deletion.
They cover:
- What data security is and why it is important?
- Data Security in Practice: implementing an effective data security strategy
Episode 6: Incident Management
Jonathon Hope, Senior Technology Evangelist at Sophos, joins the 10 Steps to Cyber Security Series for a deep dive into incident management and how organisations can better prepare for cyber incidents.
They cover:
- What is incident management is and why it is important?
- Incident management in practice: protecting your data and securing your organisation
Episode 7: Logging and Monitoring
Kostandino Kustas, Cyber Security Consultant at Sophos, and Matthew Rhodes, Regional Sales Director MSP & Strategic Accounts at Logpoint, join the 10 Steps to Cyber Security Series for a deep dive into cyber security logging and monitoring.
They cover:
- Defining logging and monitoring and the role it plays in modern cyber security
- Logging and monitoring in practice: how to protect your data and secure your organisation
Episode 8: Architecture and Configuration
Peter Morris, Systems Engineer at Cisco, and Lucian Coman, Technical Presales Consultant at TD Synnex join the Cyber Security Video Series to deep dive into how organisations can reduce risk through Architecture and Configuration.
They cover:
- Creating systems that get security right from the start
- Managing systems securely, and maintaining security over time
Episode 9: Identity and Access Management
James Pascoe, Technical Architect at Chess ICT, joins the Cyber Security Video Series to explore the key role that identity and access management plays in securing data and devices within an organisation.
They cover:
- What is identity and access management?
- Managing access to systems and devices securely
Episode 10: Supply Chain Security
Paul Crumpton, Partner Services Manager at IASME joins the 10 Steps to Cyber Security Video Series to deep dive into Supply Chain Security.
This episode covers:
- What is Supply Chain Security and why is it so important?
- Understanding and securing your supply chain
- Practical advice and implementation tips
E-BOOK
10 Steps to Cyber Security
The Ultimate Cyber Security Guide
This eBook explores the 10 Steps to Cyber Security framework developed by the National Cyber Security Centre (NCSC) and how to keep your data secure, and your organisation protected.


What is YourHackRisk Score?
Introducing HackRisk from CyberLab
Your early warning system for cyber security risks AI-powered cyber risk monitoring with secure dashboard and shareable reports, delivered by security experts.
Dark Web Scanning
Vulnerability Scanning
Recon Scanning
Supply Chain Security
Speak With an Expert
Enter your details and one of our experts will be in touch.
Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.
Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.
We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.







