Events In-person Event, London 22nd April: Protect Data, Power AI 24 March 2026 / 24 March 2026 by fluroltd Read more »
Events Webinar On demand webinar: AI & Data Security Risks – Protecting What Matters 25 February 2026 / 30 March 2026 by fluroltd Getting Your Organisation AI-Ready with Microsoft Purview On demand webinar AI tools such as Microsoft Copilot are transforming how organisations operate, but as adoption accelerates, the need for strong data security, governance and compliance becomes critical. Without the right controls in place, AI can introduce risks related to data oversharing, unauthorised access and regulatory exposure. […] Read more »
Events Webinar Quick Wins for Organisations to Govern AI Securely 9 February 2026 / 23 March 2026 by Lucy Freeman Your Roadmap to Secure, Scalable AI Adoption Before Year-End On demand webinar AI is transforming how organisations operate, but as adoption grows, so does the need for stronger governance and security. In this on-demand webinar, CWSI and Microsoft come together to share practical insights and quick wins that can make an immediate impact on how […] Read more »
Events Webinar Secure Frontline Operations in Peak Season 9 February 2026 / 25 February 2026 by Lucy Freeman On demand webinar During peak demand, frontline teams and systems operate under constant pressure. Faster workflows and heavier system loads can increase exposure to security threats if risks aren’t managed effectively. In this on-demand webinar, CWSI Secure Operations Lead Ivo Kazimirs and Microsoft Solutions Architect Juan Idowu explore how Microsoft Defender XDR and unified SecOps […] Read more »
Events Webinar Managing AI risk with Microsoft security tools. 9 February 2026 / 9 February 2026 by Emma Kemble Read more »
Events Security Awareness with Microsoft 8 February 2026 / 8 February 2026 by Emma Kemble As social engineering attacks and phishing attack mechanisms continue to evolve and humans remain the primary risk vector, it is crucial to empower your employees with intelligent simulations and targeted training to defend against phishing attacks. With the Attack Simulation Training, Microsoft offers organisations a tool to automatically check and increase digital resilience among employees […] Read more »
Events Myth Busting NIS2 and the Road to Compliance 8 February 2026 by Emma Kemble With the NIS2 compliance deadline lurking around the corner, organisations that fall under the scope of the directive can no longer afford to delay. Due to the directive’s stringent regulations, IT teams find themselves bombarded with information from various sources, leaving them overwhelmed and struggling to fully grasp the directives requirements. Watch our NIS2 webinar […] Read more »
Events AI and the Data Security Risks 8 February 2026 by Emma Kemble Artificial Intelligence (AI) tools such as Microsoft Copilot hold immense potential to revolutionise businesses, offering benefits such as increased productivity and improved customer experiences. However, businesses must proceed with caution before fully embracing this exciting technology, as the deployment of AI poses significant data security risks, which may be detrimental if organisations overlook essential steps […] Read more »
Events Navigating the Maze of Threats 8 February 2026 by Emma Kemble Watch on demand our Navigating the Maze Threats webinar, where security experts, Mark Mitchell, CTO at CWSI, Oliver Harding, Channel Lead at Chorus and Mark Jones, Head of Cyber Security at Chorus demystify the current cybersecurity threat landscape. They provide exclusive insight into real-time response tactics through a live demonstration, offering invaluable perspectives from both […] Read more »
Events Threat Hunting Webinar: The War Against Ransomware 8 February 2026 / 8 February 2026 by Emma Kemble Catch up on our webinar with cybersecurity expert Andy James, featuring three attack simulation scenarios. Learn the best practices for identifying, preventing, and remediating a cyber-attack. Gain insight into how adopting an Endpoint, Detection and Response (EDR) strategy can secure your organisation’s IT estate from a centralised console, providing increased visibility over your IT landscape, […] Read more »