10 Steps to Cyber Security Series
On Demand Videos
10 Steps to Cyber Security Series
Ten episodes based around the NCSC’s 10 Steps to Cyber Security framework to help you learn how to keep your data secure and your organisation protected.
Adam Gleeson, Vendor Alliance Manager here at CyberLab, is joined by various industry experts to discuss the key areas of cyber security to help keep organisations protected and their data secure.
Episode 1: Risk Management
Gavin Wood, CEO at CyberLab, joins Adam Gleeson to discuss the key considerations businesses need to have when creating and implementing a risk management plan.
They cover:
- Identify potential risks to your business
- Effectively prioritise these risks
- Implement control measures to mitigate risk
Episode 2: Engagement and Training
They cover:
- The risk businesses face from their people
- How to create a positive cyber security culture
- Preparing our people for cyber attacks
Episode 3: Asset Management
Andrew Noonan, Systems Engineering Director at Forescout discusses everything you need to know about asset management to protect your organisation.
They cover:
- What is asset management and why is it important?
- How to effectively implement asset management
- What to do with the asset information
Episode 4: Vulnerability Management
Andrew Walker, Digital Account Director at CyberLab, and David Dixon, Security Testing Consultant at CyberLab, discuss how to identify, assess, prioritise and mitigate security vulnerabilities.
They cover:
- What is vulnerability management and why is it important?
- Mitigating the risk from legacy systems
- Security testing and automation
Episode 5: Data Security
Adam Hartley, Senior Sales Engineer at Forcepoint, joins the cyber security video series to discuss how organisations can implement comprehensive measures to protect data from unauthorised access, modification, or deletion.
They cover:
- What data security is and why it is important?
- Data Security in Practice: implementing an effective data security strategy
Episode 6: Incident Management
Jonathon Hope, Senior Technology Evangelist at Sophos, joins the 10 Steps to Cyber Security Series for a deep dive into incident management and how organisations can better prepare for cyber incidents.
They cover:
- What is incident management is and why it is important?
- Incident management in practice: protecting your data and securing your organisation
Episode 7: Logging and Monitoring
Kostandino Kustas, Cyber Security Consultant at Sophos, and Matthew Rhodes, Regional Sales Director MSP & Strategic Accounts at Logpoint, join the 10 Steps to Cyber Security Series for a deep dive into cyber security logging and monitoring.
They cover:
- What is incident management is and why it is important?
- Incident management in practice: protecting your data and securing your organisation
Episode 8: Architecture and Configuration
Peter Morris, Systems Engineer at Cisco, and Lucian Coman, Technical Presales Consultant at TD Synnex join the Cyber Security Video Series to deep dive into how organisations can reduce risk through Architecture and Configuration.
They cover:
- Creating systems that get security right from the start
- Managing systems securely, and maintaining security over time
Episode 9: Identity and Access Management
James Pascoe, Technical Architect at Chess ICT, joins the Cyber Security Video Series to explore the key role that identity and access management plays in securing data and devices within an organisation.
They cover:
- What is identity and access management?
- Managing access to systems and devices securely
Episode 10: Supply Chain Security
Paul Crumpton, Partner Services Manager at IASME joins the 10 Steps to Cyber Security Video Series to deep dive into Supply Chain Security.
This episode covers:
- What is Supply Chain Security and why is it so important?
- Understanding and securing your supply chain
- Practical advice and implementation tips
Speak With an Expert
Enter your details and one of our specialists will be in touch.
Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.
Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.
We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.