Our Voice

What is Cloud Transformation? The Complete Guide

Discover what cloud transformation means, its benefits, and how CWSI helps businesses modernise IT systems and drive innovation through cloud solutions.

Learn More
BOOK A MEETING

Our Events

View all our upcoming CWSI events along with any on demand CWSI events below.

Upcoming

UK In-Person Event

Unleash the Future- European Security Tour with Microsoft

Join CWSI and Microsoft at the Microsoft UK Headquarters in Paddington on October 23, 2024, for an exclusive event as part of the “Unleash the Future – European Security Tour.” This dynamic in-person event will delve into the latest advancements in AI and evolving compliance regulations, providing businesses with the tools to innovate and stay competitive. Attendees will gain insight into Microsoft’s Co-Pilot capabilities through live technical demos, explore advanced strategies for data protection and regulatory compliance, and witness live security threat demonstrations. The event will also feature a special keynote session with Former Head of the UK Government Office for AI, Sana Khareghani, who will be sharing expert insights into the future of AI.

Date & Time: October 23rd, 9:30am-3:20pm (BST)

Bulbs

Past Events

Secure the Future: Mastering AI Implementation

AI is rapidly transforming the workplace, with tools like Microsoft Copilot showcasing remarkable ability to access, map and analyse data within a company’s Microsoft environment, offering valuable recommendations based on the insights it gathers. However, as more businesses seek to integrate AI, they must proceed with caution for the adoption of AI carries significant cybersecurity risks, which could have serious consequences if crucial mitigation steps are missed during its implementation.

Catch up on our, “Securing the Future: Mastering AI Implementation” webinar, led by CWSI’s Paul Conaty and Microsoft’s Brenda Pessoa, who guide you through how to overcome the challenges of AI deployment and how to prepare your organisation to be AI-ready. They share key steps and a roadmap for secure AI implementation.

YouTube video
YouTube video

Threat Hunting Webinar: The War Against Ransomware

Catch up on our webinar with cybersecurity expert Andy James, featuring three attack simulation scenarios. Learn the best practices for identifying, preventing, and remediating a cyber-attack. Gain insight into how adopting an Endpoint, Detection and Response (EDR) strategy can secure your organisation’s IT estate from a centralised console, providing increased visibility over your IT landscape, reducing false positives, and enabling early detection and remediation of ransomware attacks.

Navigating the Maze of Threats

Watch on demand our Navigating the Maze Threats webinar, where security experts, Mark Mitchell, CTO at CWSI, Oliver Harding, Channel Lead at Chorus and Mark Jones, Head of Cyber Security at Chorus demystify the current cybersecurity threat landscape. They provide exclusive insight into real-time response tactics through a live demonstration, offering invaluable perspectives from both offensive and defensive strategies.

YouTube video
YouTube video

AI and the Data Security Risks

Artificial Intelligence (AI) tools such as Microsoft Copilot hold immense potential to revolutionise businesses, offering benefits such as increased productivity and improved customer experiences. However, businesses must proceed with caution before fully embracing this exciting technology, as the deployment of AI poses significant data security risks, which may be detrimental if organisations overlook essential steps during implementation.

Watch our webinar in collaboration with Microsoft, where data security experts, CWSI’s Paul Conaty and Microsoft’s Brenda Pessoa, delve into the data security challenges organisations face during AI adoption. They explore how Microsoft Copilot interacts with an organisations data and the risks of deploying AI in an unmanaged environment. Receive valuable guidance, best practices and strategies on how to safeguard your organisations sensitive information, whilst harnessing the power of AI.

The Frontline-First Approach to Digitalisation

Frontline workers are the face of your organisation. Equipping them with the right tools to do their jobs not only helps them stay productive, but also gives them back time that they can spend with clients, patients, or on the task at hand.

To help you enhance your frontline worker experience and performance, watch our live event on demand in partnership with Samsung, ‘The Frontline- First Approach to Digitalisation’. During the one-hour online session, CWSI’s Modern Workplace Experts Björn Kemps, Theirry Lammers and Paul Conaty along with Samsung’s Frontline Expert, Wincho Bacuna, will exchange industry best practices and practical examples aimed at empowering your people to work more efficiently and stay secure, no matter where they are.

YouTube video
YouTube video

Myth Busting NIS2 and the Road to Compliance

With the NIS2 compliance deadline lurking around the corner, organisations that fall under the scope of the directive can no longer afford to delay. Due to the directive’s stringent regulations, IT teams find themselves bombarded with information from various sources, leaving them overwhelmed and struggling to fully grasp the directives requirements.

Watch our NIS2 webinar in collaboration with Microsoft, where you can gain a comprehensive understanding of how NIS2 builds upon the original NIS1 directive, the businesses it impacts and some of the first actions your organisation should take towards becoming compliant.

Security Awareness with Microsoft

As social engineering attacks and phishing attack mechanisms continue to evolve and humans remain the primary risk vector, it is crucial to empower your employees with intelligent simulations and targeted training to defend against phishing attacks. With the Attack Simulation Training, Microsoft offers organisations a tool to automatically check and increase digital resilience among employees and create awareness on new phishing tactics.

Watch our one-hour webinar, where Microsoft experts Tim Struik and Nick Van Oosterwijk delve into:

  • The licenses and roles required
  • The different attack simulation models
  • How to carry out an efficient and effective simulation
  • The end user experience
  • The advantages of using Microsoft tooling to perform this simulation
YouTube video
YouTube video

How Employee Experience is Reshaping the Workplace in 2024

As the labour market continues to evolve in 2024, adapting to new trends and challenges is key when wanting to stay competitive. To help you navigate through growing employee expectations, CWSI joined forces with Human Services Provider, SBS Skill BuilderS for an educational online session on the workplace of the future.

In this webinar our Workplace experts walk you through the key trends that are reshaping employee experience 2024 and shared practical tips and tricks on how to adapt to the changing needs of the workforce and labour market. During the session they zoomed into how SBS Skill BuilderS refines and optimises its employee experience strategy to drive people and business growth.

Preparing Your Organisation for Generative AI

Businesses are accelerating their AI transformation to fuel growth and profitability, while scaling go-to-market strategies and support productivity.

Watch our webinar where we cover:

  • The future of AI for business
  • Introducing Microsoft Copilot (with demo)
  • The risks of adopting AI
  • How to mitigate the risks of AI
  • Preparing your organisation for generative AI
YouTube video
YouTube video

Cyber Security for Education

In today’s world of internet-connected smart devices, ensuring both physical and digital security is more crucial and intricate than ever before. The safety of your students and staff demands a comprehensive approach to cybersecurity.

Discover how Microsoft technologies, when combined with best practices, can significantly reduce the risk of cyberattacks and protect your Campus.

Threat Hunting: In the Attackers Eyes

Watch the Threat Hunting session led by cyber security expert Andy James, to discover how adopting an EDR strategy can protect your IT estate from one centralised console, providing increased visibility over your IT landscape, a reduction of false positives and early detection and remediation of ransomware attacks.

YouTube video
YouTube video

Not Every Emergency has to be a Disaster

Hear from CWSI’s Paul Conaty and former Director of GCHQ, Sir David Omand, as they discuss crisis management. The pair drew on insights from Sir David’s latest book, “How to Survive a Crisis: Lessons in Resilience and Avoiding Disaster,” providing a unique perspective on how to navigate through the treacherous landscape of today’s cyber threats.

Building an Innovative Cyber Security Operations Centre

On average it takes an IT team 187 days to detect a security breach which can lead to ransomware attacks and large financial implications. How is best to protect your organisation from being the next target of cybercrime?

Discover:

  • What is a Cyber Security Operations Centre?
  • Why do you need one?
  • What does building a Security Operations Centre look like, what do you need to consider?
  • Tips & Tricks on how to successfully work with a Cyber Security Operations Centre partner.
YouTube video
YouTube video

Microsoft Data Security & Compliance

CWSI is an expert in the Microsoft suite and can help you embark on a unique, efficient compliance journey. During this one hour webinar we introduce you to the challenges of today’s decentralised, data-rich workplace and share tips on how to govern, protect, and manage your entire data estate.

Future-proof Your Workforce

To operate successfully in today’s remote workplace, new, flexible tools for management and configuration are a must. Watch the Future-Proof Your Workforce Webinar, where Product Director, Wouter Troost explains how to tackle some of the most common challenges faced by IT Teams:

  • The IT Landscape complexity.
  • Roadblocks that are hindering collaboration.  
  • Security of all technologies and how to manage.
  • The Shortage of resources.
  • What are the challenges of the future. 
YouTube video
YouTube video

Day in the Life of a CRO

Watch the exclusive book launch of ‘How to be a Chief Risk Officer‘, written by industry expert Jennifer Geary. Following on from the success of her first book on the COO role, this book de-mystifies the CRO role by breaking it into its constituent parts and outlining the requirements in the current day. Drawing on industry standards and enriched with expert insight and real-life current examples, it condenses a vast range of knowledge and experience into one accessible read.

Microsoft Entra

Watch this webinar to understand how quickly Microsoft Entra Permissions Management can bring your IaaS platform into compliance.

Discover:

  • What Entra Permissions covers and how it integrates and what it mitigates.
  • How it aligns to CIS/ NCSC/ NIST frameworks for compliance.
  • How quickly it provides results.
YouTube video
YouTube video

SentinelOne Foundations of Cloud Security

Watch our SentinelOne Cloud Security Webinar where the expert’s take you through:

  • Why traditional on-prem security approaches don’t work in the cloud. 
  • The key components of cloud security
  • The importance of automated application control to protect cloud-native workloads with “lockdown” capabilities.
  • How SentinelOne Singularity Cloud simplifies the security of cloud VMs and containers, providing runtime protection that detects anomalies in running workloads, and identifies and kills unauthorised processes

Microsoft Data Loss Prevention

Increased volumes of data and the spread of collaboration is leading to a significant burden for compliance teams and general data management.

Watch the webinar to discover:

  • The main causes of data leaks and threats
  • The stages of a DLP strategy
  • DLP, Governance, and Compliance
  • What is advanced threat protection
  • Threat defence and Compliance
  • Real-Life customer business case
YouTube video