News and Events

News

Exposed Vulnerabilities: Building Resilient Supply Chains

Small businesses are crucial to supply chains, but their vulnerability to cybercrime poses significant risks. With 3.69 million UK small businesses experiencing cyber attacks in the past two years, building resilient supply chains is more important than ever. Risk Evolves' Helen Barge will address this critical issue at the 2024 Global Cyber Summit, discussing strategies for enhancing cybersecurity across all business sizes. Learn how to protect your supply chain and strengthen your cyber defences.
Read more »
person using mfa on smartphone in front of laptop | GDPR compliance cyber security

GDPR Compliance: Cyber security just got even more serious (if that was possible)

The Information Commissioner's Office (ICO) is taking a firm stance against companies that mishandle sensitive data. A recent £6.09m provisional fine highlights the critical importance of GDPR compliance and robust cyber security measures. Learn how businesses can protect themselves from cyber threats and potential ICO
Read more »

How to Ensure Supply Chain Trust: A Comprehensive Guide

In today's interconnected business world, ensuring supply chain trust is crucial. The recent CrowdStrike incident, which caused a global IT outage affecting Microsoft and countless businesses, highlights the critical importance of supplier reliability. This comprehensive guide explores key strategies for building trust in your supply
Read more »

Data Protection Officer Responsibilities: Beyond Legal Expertise

With the introduction of the EU GDPR in 2018 and its continuation under the UK GDPR, many organisations have turned to legal professionals to fulfil the role of Data Protection Officer (DPO). However, the data protection officer responsibilities extend far beyond legal expertise. Have you

Read more »
Person made out of data | Subject Access Request

Mastering Subject Access Requests: Your Essential Guide

In today's data-driven world, understanding how to handle UK GDPR Subject Access Requests (SARs) is crucial for businesses. This guide outlines the essential steps for responding to SARs, from verifying the requestor's identity to securely delivering the requested data. By following best practices and engaging
Read more »

Upcoming events

Cyber Safe – But can I be sure?

Join us for "Cyber Safe: Essential InfoSec Practices for Everyone" and transform from a worried worker into a confident cyber defender. Our expert Phill Davies will guide you through practical steps to protect your personal and business data. Book your spot now and take control of your digital security!

Privacy and Marketing — Is your marketing strategy compliant?

Join us for our session on "Privacy and Marketing" and transform from a worried marketer into a confident compliance champion. Our expert, Anna Walters, will guide you through the essentials of aligning your marketing efforts with data protection laws. Book your place now and take the first step towards worry-free, compliant marketing!

Resilience Ready – Building a Business Continuity Plan That Works

Join us for "Resilience Ready: Building a Business Continuity Plan That Works" and transform from a frazzled manager into a prepared leader. Our business continuity expert, Muneebah Kara, will guide you through creating a robust plan to keep your business running smoothly, no matter what challenges arise.

Previous sessions

GDPR 101: Demystifying Data Privacy

This webinar provides an introduction to the General Data Protection Regulation (GDPR). We will cover the basics of data protection, key compliance requirements, and practical steps for businesses. Whether you are new to data privacy or need a refresher, this..

Mergers & Acquisitions: Your Guide to Business Matchmaking

'Always start with the end in mind` is advice often given to small businesses. If you're planning to sell your business or considering acquiring one, this webinar will guide you through the benefits of a robust compliance culture and key..

Supplier Security Essentials: Safeguarding Your Supply Chain

In this webinar, we will discuss how to assess supplier risks and implement effective security measures. You will also learn how to manage ongoing relationships to ensure your supply chain remains resilient and secure against potential threats...

SAR Secrets Unveiled: A Beginner’s Guide to Subject Access Requests

Learn about Subject Access Requests (SARs) in this informative session. We will explain what SARs are, why they are important, and how to manage them effectively. You will gain insights into the process, legal obligations, and best practices, ensuring you..

Beginners Guide to Sustainability

As climate concerns continue to shape the future of industries worldwide, understanding how to integrate sustainable practices into your organisation is more crucial than ever. In this session, we will delve into innovative strategies that businesses can adopt to make..

Cracking the Code: NIS2 & DORA Legislation Made Simple

Join our webinar to explore the latest developments in cybersecurity and digital operational resilience. We will explain the NIS2 and DORA legislation, detailing what these regulations mean for your business. Learn the necessary steps for compliance and discover how to..