10 Steps to Cyber Security Series

On Demand Videos

10 Steps to Cyber Security Series

Ten episodes based around the NCSC’s 10 Steps to Cyber Security framework to help you learn how to keep your data secure and your organisation protected.

Adam Gleeson, Vendor Alliance Manager here at CyberLab, is joined by various industry experts to discuss the key areas of cyber security to help keep organisations protected and their data secure.

10 Steps to cyber Security thumbnail

Listen on-the-go with Spotify

Episode 1: Risk Management

Gavin Wood, CEO at CyberLab, joins Adam Gleeson to discuss the key considerations businesses need to have when creating and implementing a risk management plan.


They cover:

  • Identify potential risks to your business
  • Effectively prioritise these risks
  • Implement control measures to mitigate risk

Read the full blog post on Risk Management.

Listen on-the-go with Spotify

Episode 2: Engagement and Training

Jack Smallpage, ISO at CyberLab, and Colin Aitkenhead, Consultant at CyberLab, join the series as they discuss how organisations can build cyber security that works for your people.

They cover:
  • The risk businesses face from their people
  • How to create a positive cyber security culture
  • Preparing our people for cyber attacks

Listen on-the-go with Spotify

Episode 3: Asset Management

Andrew Noonan, Systems Engineering Director at Forescout discusses everything you need to know about asset management to protect your organisation.


They cover:

  • What is asset management and why is it important?
  • How to effectively implement asset management
  • What to do with the asset information

Read the full blog post on Asset Management.

Listen on-the-go with Spotify

Episode 4: Vulnerability Management

Andrew Walker, Digital Account Director at CyberLab, and David Dixon, Security Testing Consultant at CyberLab, discuss how to identify, assess, prioritise and mitigate security vulnerabilities.

They cover:

  • What is vulnerability management and why is it important?
  • Mitigating the risk from legacy systems
  • Security testing and automation

Read the full blog post on Vulnerability Management.

Listen on-the-go with Spotify

Episode 5: Data Security

Adam Hartley, Senior Sales Engineer at Forcepoint, joins the cyber security video series to discuss how organisations can implement comprehensive measures to protect data from unauthorised access, modification, or deletion.

They cover:

  • What data security is and why it is important?
  • Data Security in Practice: implementing an effective data security strategy

Read the full blog post on Data Security.

Listen on-the-go with Spotify

Episode 6: Incident Management

Jonathon Hope, Senior Technology Evangelist at Sophos, joins the 10 Steps to Cyber Security Series for a deep dive into incident management and how organisations can better prepare for cyber incidents.

They cover:

  • What is incident management is and why it is important?
  • Incident management in practice: protecting your data and securing your organisation

Read the full blog post on Incident Management.

Listen on-the-go with Spotify

Episode 7: Logging and Monitoring

Kostandino Kustas, Cyber Security Consultant at Sophos, and Matthew Rhodes, Regional Sales Director MSP & Strategic Accounts at Logpoint, join the 10 Steps to Cyber Security Series for a deep dive into cyber security logging and monitoring.

They cover:

  • What is incident management is and why it is important?
  • Incident management in practice: protecting your data and securing your organisation

Read the full blog post on Logging and Monitoring.

Listen on-the-go with Spotify

Episode 8: Architecture and Configuration

Peter Morris, Systems Engineer at Cisco, and Lucian Coman, Technical Presales Consultant at TD Synnex join the Cyber Security Video Series to deep dive into how organisations can reduce risk through Architecture and Configuration.


They cover:

  • Creating systems that get security right from the start
  • Managing systems securely, and maintaining security over time

Read the full blog post on Architecture and Configuration.

Speak With an Expert

Enter your details and one of our specialists will be in touch.

Whether you’re looking to implement basic cyber security best practice, improve your existing defences, or introduce a new system or solution, our team of expert consultants, engineers, and ethical hackers are here to help.

Our team specialise in creating bespoke security solutions and testing packages to improve and maintain your security posture.

We are 100% vendor agnostic and will only ever recommend the best products and solutions for your requirements.