GIVE YOURSELF AN HOUR OUT OF YOUR DAY & ENRICH YOUR KNOWLEDGE

Get Informed With Risk Crew Webinars

ON-DEMAND WEBINARS

SOC-IT-2-ME

Webinar Series

 

 

 

SOC-IT-2-ME SUMMIT

 

Get the Knowledge to Begin the Ascent to Compliance

These flash sessions cover:

Session 1: All things SOC 2: Why it’s becoming the global information security standard

Session 2: SaaS best security practices

Session 3: SOC 2 – The Fast Track

Session 4: Q & A

 

Download

 

 

 

SOC 2 Type 2: How to Prepare for the Audit

 

 

This webinar will cover:

 

  • The steps to get ready
  • Selecting the Trust Service Criteria
  • The importance of control mapping
  • Never ask a question you don’t know the answer to – the first rule of surviving the audit: evidence
  • A typical timeline
  • Interactive Q&A

Download Here

 

 

SOC 1, 2 or 3 – Know the Difference

This webinar covers:

  • What is SOC?
  • What is the difference between SOC 1, 2 & 3?
  • What are the types of reports for each?
  • What are the 5 Trust Service Principles?
  • Which SOC is right for your organisation?
  • What are the commercial benefits of compliance?
  • Interactive Q&A

Download Here

[/row]

DATA PROTECTION & PRIVACY

Webinar Series

 

 

 

Conducting DPIAs: The Key to Unlocking Data Protection Compliance

 

What’s a data impact assessment? When should I conduct one and why? What is the value of my compliance efforts?

Join this webinar to get these answers and the opportunity to ask your other pressing questions surrounding the unsung DPIA tool – that is the key to DPA and GDPR compliance.

Download Here

 

 

What Data Flow Mapping Looks Like and How to Start

 

Both UK Data Protection Act 2018 and GDPR compliance require that organisations document how the personal data they process is transferred from one location to another. It is also the first critical step in conducting a DPIA to identify and address the associated security risks in this process. Our Data Protection Sage (and Amateur Brewer) Andy Whitaker provides practical advice and gives a demonstration on how to get this done.

Download here

 

 

How to Conduct a Data Privacy Impact Assessment (DPIA)

 

What is a Data Privacy Impact Assessment? When do you need to conduct one? Join us for this pragmatic and informative webinar hosted by our Data Privacy & Protection expert, Ursula Baye. Ursula discusses the goals and objectives of this critical data protection requirement. She walks you through a simple step-by-step demonstration of how to conduct a DPIA followed by a question and answer session.

Download here

 

 

How to Implement Data Protection by Design & Default

Do you understand the principle of Data Protection by Design & Default? Does your organisation adhere to this much over-looked data protection requirement? Watch this useful, straightforward webinar hosted by our Data Privacy & Protection expert, Andy Whitaker. Andy discusses the goals and objectives of this essential principle and provides some practical advice for ensuring it’s included in your data protection programme.

Download here

 

 

Data Protection: What Constitutes ‘Evidence of Compliance?’

Are you compliant to GDPR & DPA 2018? How do you know? Can you prove it?

This practical webinar is hosted by our Data Privacy & Protection expert, Andy Whitaker. Andy discusses the use of key performance indicators to implement and monitor in order to ensure you can demonstrate compliance.

Download here

3 DEGREES OF SECURITY TESTING – People, Process & Technology

Webinar Series

 

 

Holistic Security Testing in the New Threat Landscape

Ever wanted to know what Holistic Security testing involves and how it can help create a strong defence against the evolving cyber threat landscape?

Download this webinar hosted by Geoffrey Bougnague and Richard Hollis. Stay tuned for the last 15 minutes, when they open the floor to attendees for security testing questions.

Download Here

 

 

 

 

How to Protect Against Your Biggest Threat – People

Did you know that human error caused 90% of UK data breaches in 2019, according to the ICO?

Download this webinar and find out how to mitigate this imminent threat with current best practices and training methods for the workplace – whether that is in the office or at home. Plus, you’ll get insight from a security testing expert who will take you through three social engineering attacks to perform on your staff to identify vulnerabilities.

Download here

 

 

How to Optimise Your Security Penetration Testing

Do you want some practical advice on how to get a better return on your security penetration testing investment?

Download this webinar to hear from our penetration testing expert, Richard Hollis discussing how you can receive full benefits from your penetration testing.

Be sure to stay tuned for an interactive questions and answers session at the end.

Download here

Security Penetration Testing

7 Things to Include in your Testing Supplier’s SLA

A security penetration testing service is too critical to leave anything to chance. Get it in writing.

Download this webinar hosted by, Geoffrey Bougnague for 7 key things to ensure to include in your testing provider’s service level agreement.

Download here

Plus, get your free copy of our complimentary Service Level Agreement Checklist!

Download the SLA Checklist

CYBER ESSENTIALS SERIES

Webinar Series