Our Voice

NIS2: Changes to Data Compliance

Learn the layers of data security which will be required to successfully achieve NIS2 compliance before the directives October deadline.

Learn More
BOOK A MEETING

Our Events

View all our upcoming CWSI events along with any on demand CWSI events below.

Upcoming

Online Event

Microsoft Immersion Workshop: Into the Breach

We are joining forces with Microsoft for an immersive one-day workshop supporting you in efficiently and effectively protecting your organisation against advanced cyber threats. During immersive workshop, you will take on the role of a security analyst faced with a high stake simulated attack. Throughout you will gain practical experience with Microsoft Security Products and turn that knowledge into direct action to navigate and end the attack.

April 25 | 10 am-3pm (GMT)

Register HERE

Lady on ipad in blue jumper

Past Events

YouTube video

Myth Busting NIS2 and the Road to Compliance

With the NIS2 compliance deadline lurking around the corner, organisations that fall under the scope of the directive can no longer afford to delay. Due to the directive’s stringent regulations, IT teams find themselves bombarded with information from various sources, leaving them overwhelmed and struggling to fully grasp the directives requirements.

Watch our NIS2 webinar in collaboration with Microsoft, where you can gain a comprehensive understanding of how NIS2 builds upon the original NIS1 directive, the businesses it impacts and some of the first actions your organisation should take towards becoming compliant.

Security Awareness with Microsoft

As social engineering attacks and phishing attack mechanisms continue to evolve and humans remain the primary risk vector, it is crucial to empower your employees with intelligent simulations and targeted training to defend against phishing attacks. With the Attack Simulation Training, Microsoft offers organisations a tool to automatically check and increase digital resilience among employees and create awareness on new phishing tactics.

Watch our one-hour webinar, where Microsoft experts Tim Struik and Nick Van Oosterwijk delve into:

  • The licenses and roles required
  • The different attack simulation models
  • How to carry out an efficient and effective simulation
  • The end user experience
  • The advantages of using Microsoft tooling to perform this simulation
YouTube video
YouTube video

How Employee Experience is Reshaping the Workplace in 2024

As the labour market continues to evolve in 2024, adapting to new trends and challenges is key when wanting to stay competitive. To help you navigate through growing employee expectations, CWSI joined forces with Human Services Provider, SBS Skill BuilderS for an educational online session on the workplace of the future.

In this webinar our Workplace experts walk you through the key trends that are reshaping employee experience 2024 and shared practical tips and tricks on how to adapt to the changing needs of the workforce and labour market. During the session they zoomed into how SBS Skill BuilderS refines and optimises its employee experience strategy to drive people and business growth.

Preparing Your Organisation for Generative AI

Businesses are accelerating their AI transformation to fuel growth and profitability, while scaling go-to-market strategies and support productivity.

Watch our webinar where we cover:

  • The future of AI for business
  • Introducing Microsoft Copilot (with demo)
  • The risks of adopting AI
  • How to mitigate the risks of AI
  • Preparing your organisation for generative AI
YouTube video
YouTube video

Cyber Security for Education

In today’s world of internet-connected smart devices, ensuring both physical and digital security is more crucial and intricate than ever before. The safety of your students and staff demands a comprehensive approach to cybersecurity.

Discover how Microsoft technologies, when combined with best practices, can significantly reduce the risk of cyberattacks and protect your Campus.

Threat Hunting: In the Attackers Eyes

Watch the Threat Hunting session led by cyber security expert Andy James, to discover how adopting an EDR strategy can protect your IT estate from one centralised console, providing increased visibility over your IT landscape, a reduction of false positives and early detection and remediation of ransomware attacks.

YouTube video
YouTube video

Not Every Emergency has to be a Disaster

Hear from CWSI’s Paul Conaty and former Director of GCHQ, Sir David Omand, as they discuss crisis management. The pair drew on insights from Sir David’s latest book, “How to Survive a Crisis: Lessons in Resilience and Avoiding Disaster,” providing a unique perspective on how to navigate through the treacherous landscape of today’s cyber threats.

Building an Innovative Cyber Security Operations Centre

On average it takes an IT team 187 days to detect a security breach which can lead to ransomware attacks and large financial implications. How is best to protect your organisation from being the next target of cybercrime?

Discover:

  • What is a Cyber Security Operations Centre?
  • Why do you need one?
  • What does building a Security Operations Centre look like, what do you need to consider?
  • Tips & Tricks on how to successfully work with a Cyber Security Operations Centre partner.
YouTube video
YouTube video

Microsoft Data Security & Compliance

CWSI is an expert in the Microsoft suite and can help you embark on a unique, efficient compliance journey. During this one hour webinar we introduce you to the challenges of today’s decentralised, data-rich workplace and share tips on how to govern, protect, and manage your entire data estate.

Future-proof Your Workforce

To operate successfully in today’s remote workplace, new, flexible tools for management and configuration are a must. Watch the Future-Proof Your Workforce Webinar, where Product Director, Wouter Troost explains how to tackle some of the most common challenges faced by IT Teams:

  • The IT Landscape complexity.
  • Roadblocks that are hindering collaboration.  
  • Security of all technologies and how to manage.
  • The Shortage of resources.
  • What are the challenges of the future. 
YouTube video
YouTube video

Day in the Life of a CRO

Watch the exclusive book launch of ‘How to be a Chief Risk Officer‘, written by industry expert Jennifer Geary. Following on from the success of her first book on the COO role, this book de-mystifies the CRO role by breaking it into its constituent parts and outlining the requirements in the current day. Drawing on industry standards and enriched with expert insight and real-life current examples, it condenses a vast range of knowledge and experience into one accessible read.

Microsoft Entra

Watch this webinar to understand how quickly Microsoft Entra Permissions Management can bring your IaaS platform into compliance.

Discover:

  • What Entra Permissions covers and how it integrates and what it mitigates.
  • How it aligns to CIS/ NCSC/ NIST frameworks for compliance.
  • How quickly it provides results.
YouTube video
YouTube video

SentinelOne Foundations of Cloud Security

Watch our SentinelOne Cloud Security Webinar where the expert’s take you through:

  • Why traditional on-prem security approaches don’t work in the cloud. 
  • The key components of cloud security
  • The importance of automated application control to protect cloud-native workloads with “lockdown” capabilities.
  • How SentinelOne Singularity Cloud simplifies the security of cloud VMs and containers, providing runtime protection that detects anomalies in running workloads, and identifies and kills unauthorised processes

Microsoft Data Loss Prevention

Increased volumes of data and the spread of collaboration is leading to a significant burden for compliance teams and general data management.

Watch the webinar to discover:

  • The main causes of data leaks and threats
  • The stages of a DLP strategy
  • DLP, Governance, and Compliance
  • What is advanced threat protection
  • Threat defence and Compliance
  • Real-Life customer business case
YouTube video