SI Insights

Our experts share insights into risks, threats and trends in the ever-changing cyber security landscape.

Communicating cyber risk
Communicating cyber risk
June 7, 2023
7 strategies to effectively communicate cyber risk to the board
7 strategies to effectively communicate cyber risk to the board
“Communicating cyber risk is hard to do well and it’s really easy to burn credibility with the board. It is however one of the crucial practices that defines today’s security leadership, and the stakes have never been higher, so it’s critical that we get it right.” James Lyne
Read MoreRead More
February 23, 2023
7 steps to test your cloud environments, services & data
7 steps to test your cloud environments, services & data
We recently hosted a webinar with a panel of experts from Secure Impact and SANS EMEA, and have summarised their top tips into a checklist for you and your team.
Read MoreRead More
June 13, 2022
The 6 critical aspects of incident response - what works and what makes breaches worse
The 6 critical aspects of incident response - what works and what makes breaches worse
"These are the practical steps that you can apply now to make sure you limit damage to your reputation and achieve the best outcome with regulators. Don’t make the mistake of waiting until the house is on fire!” James Lyne
Read MoreRead More
February 22, 2022
The CISO roundtable report: Bridging the gap between security and business
The CISO roundtable report: Bridging the gap between security and business
This report contains insights from some of UK's leading security leaders, including metrics to use when talking to the board, advice around the best version of an ICO investigation, concerns surrounding penetration testing and the importance of communication in the role of a CISO.
Read MoreRead More
December 1, 2021
The CISO’s guide to powerful purple teaming - collaborative Red & Blue team security strategy
The CISO’s guide to powerful purple teaming - collaborative Red & Blue team security strategy
We see the term ‘purple teaming’ being used increasingly frequently, but let’s remind ourselves of the real problem it’s looking to solve, and the possible successful outcomes for your business and cyber security team.
Read MoreRead More

Sign up to our newsletter to receive the latest updates