White Paper
Our Events
View all our upcoming CWSI events along with any on demand CWSI events below.
Upcoming
We currently have no upcoming events.
Past Events
Unlocking the Power of Microsoft Entra: A Deep Dive into Identity Security
As organisations look to drive digital transformation and adapt to hybrid working models, the need for robust identity controls has become paramount. With the Microsoft Entra Suite, organisations are able to secure identities and access through a single unified platform, enhancing their overall security posture. However, while many organisations have adopted Microsoft Entra, most are not fully aware of the new Entra Suite and its extensive capabilities, or aren’t utilising it to its full potential.
Tune into our webinar in partnership with Microsoft, where identity experts Steven Parker from CWSI and Microsoft’s Aileen Finlay and Karim Kayad, provide a comprehensive overview of the Microsoft Entra Suite’s tools and demonstrate how they can transform your organisation’s identity security posture.
Secure the Future: Mastering AI Implementation
AI is rapidly transforming the workplace, with tools like Microsoft Copilot showcasing remarkable ability to access, map and analyse data within a company’s Microsoft environment, offering valuable recommendations based on the insights it gathers. However, as more businesses seek to integrate AI, they must proceed with caution for the adoption of AI carries significant cybersecurity risks, which could have serious consequences if crucial mitigation steps are missed during its implementation.
Catch up on our, “Securing the Future: Mastering AI Implementation” webinar, led by CWSI’s Paul Conaty and Microsoft’s Brenda Pessoa, who guide you through how to overcome the challenges of AI deployment and how to prepare your organisation to be AI-ready. They share key steps and a roadmap for secure AI implementation.
Threat Hunting Webinar: The War Against Ransomware
Catch up on our webinar with cybersecurity expert Andy James, featuring three attack simulation scenarios. Learn the best practices for identifying, preventing, and remediating a cyber-attack. Gain insight into how adopting an Endpoint, Detection and Response (EDR) strategy can secure your organisation’s IT estate from a centralised console, providing increased visibility over your IT landscape, reducing false positives, and enabling early detection and remediation of ransomware attacks.
Navigating the Maze of Threats
Watch on demand our Navigating the Maze Threats webinar, where security experts, Mark Mitchell, CTO at CWSI, Oliver Harding, Channel Lead at Chorus and Mark Jones, Head of Cyber Security at Chorus demystify the current cybersecurity threat landscape. They provide exclusive insight into real-time response tactics through a live demonstration, offering invaluable perspectives from both offensive and defensive strategies.
AI and the Data Security Risks
Artificial Intelligence (AI) tools such as Microsoft Copilot hold immense potential to revolutionise businesses, offering benefits such as increased productivity and improved customer experiences. However, businesses must proceed with caution before fully embracing this exciting technology, as the deployment of AI poses significant data security risks, which may be detrimental if organisations overlook essential steps during implementation.
Watch our webinar in collaboration with Microsoft, where data security experts, CWSI’s Paul Conaty and Microsoft’s Brenda Pessoa, delve into the data security challenges organisations face during AI adoption. They explore how Microsoft Copilot interacts with an organisations data and the risks of deploying AI in an unmanaged environment. Receive valuable guidance, best practices and strategies on how to safeguard your organisations sensitive information, whilst harnessing the power of AI.
The Frontline-First Approach to Digitalisation
Frontline workers are the face of your organisation. Equipping them with the right tools to do their jobs not only helps them stay productive, but also gives them back time that they can spend with clients, patients, or on the task at hand.
To help you enhance your frontline worker experience and performance, watch our live event on demand in partnership with Samsung, ‘The Frontline- First Approach to Digitalisation’. During the one-hour online session, CWSI’s Modern Workplace Experts Björn Kemps, Theirry Lammers and Paul Conaty along with Samsung’s Frontline Expert, Wincho Bacuna, will exchange industry best practices and practical examples aimed at empowering your people to work more efficiently and stay secure, no matter where they are.
Myth Busting NIS2 and the Road to Compliance
With the NIS2 compliance deadline lurking around the corner, organisations that fall under the scope of the directive can no longer afford to delay. Due to the directive’s stringent regulations, IT teams find themselves bombarded with information from various sources, leaving them overwhelmed and struggling to fully grasp the directives requirements.
Watch our NIS2 webinar in collaboration with Microsoft, where you can gain a comprehensive understanding of how NIS2 builds upon the original NIS1 directive, the businesses it impacts and some of the first actions your organisation should take towards becoming compliant.
Security Awareness with Microsoft
As social engineering attacks and phishing attack mechanisms continue to evolve and humans remain the primary risk vector, it is crucial to empower your employees with intelligent simulations and targeted training to defend against phishing attacks. With the Attack Simulation Training, Microsoft offers organisations a tool to automatically check and increase digital resilience among employees and create awareness on new phishing tactics.
Watch our one-hour webinar, where Microsoft experts Tim Struik and Nick Van Oosterwijk delve into:
- The licenses and roles required
- The different attack simulation models
- How to carry out an efficient and effective simulation
- The end user experience
- The advantages of using Microsoft tooling to perform this simulation
How Employee Experience is Reshaping the Workplace in 2024
As the labour market continues to evolve in 2024, adapting to new trends and challenges is key when wanting to stay competitive. To help you navigate through growing employee expectations, CWSI joined forces with Human Services Provider, SBS Skill BuilderS for an educational online session on the workplace of the future.
In this webinar our Workplace experts walk you through the key trends that are reshaping employee experience 2024 and shared practical tips and tricks on how to adapt to the changing needs of the workforce and labour market. During the session they zoomed into how SBS Skill BuilderS refines and optimises its employee experience strategy to drive people and business growth.
Preparing Your Organisation for Generative AI
Businesses are accelerating their AI transformation to fuel growth and profitability, while scaling go-to-market strategies and support productivity.
Watch our webinar where we cover:
- The future of AI for business
- Introducing Microsoft Copilot (with demo)
- The risks of adopting AI
- How to mitigate the risks of AI
- Preparing your organisation for generative AI
Cyber Security for Education
In today’s world of internet-connected smart devices, ensuring both physical and digital security is more crucial and intricate than ever before. The safety of your students and staff demands a comprehensive approach to cybersecurity.
Discover how Microsoft technologies, when combined with best practices, can significantly reduce the risk of cyberattacks and protect your Campus.
Threat Hunting: In the Attackers Eyes
Watch the Threat Hunting session led by cyber security expert Andy James, to discover how adopting an EDR strategy can protect your IT estate from one centralised console, providing increased visibility over your IT landscape, a reduction of false positives and early detection and remediation of ransomware attacks.
Not Every Emergency has to be a Disaster
Hear from CWSI’s Paul Conaty and former Director of GCHQ, Sir David Omand, as they discuss crisis management. The pair drew on insights from Sir David’s latest book, “How to Survive a Crisis: Lessons in Resilience and Avoiding Disaster,” providing a unique perspective on how to navigate through the treacherous landscape of today’s cyber threats.
Building an Innovative Cyber Security Operations Centre
On average it takes an IT team 187 days to detect a security breach which can lead to ransomware attacks and large financial implications. How is best to protect your organisation from being the next target of cybercrime?
Discover:
- What is a Cyber Security Operations Centre?
- Why do you need one?
- What does building a Security Operations Centre look like, what do you need to consider?
- Tips & Tricks on how to successfully work with a Cyber Security Operations Centre partner.
Microsoft Data Security & Compliance
CWSI is an expert in the Microsoft suite and can help you embark on a unique, efficient compliance journey. During this one hour webinar we introduce you to the challenges of today’s decentralised, data-rich workplace and share tips on how to govern, protect, and manage your entire data estate.
Future-proof Your Workforce
To operate successfully in today’s remote workplace, new, flexible tools for management and configuration are a must. Watch the Future-Proof Your Workforce Webinar, where Product Director, Wouter Troost explains how to tackle some of the most common challenges faced by IT Teams:
- The IT Landscape complexity.
- Roadblocks that are hindering collaboration.
- Security of all technologies and how to manage.
- The Shortage of resources.
- What are the challenges of the future.
Day in the Life of a CRO
Watch the exclusive book launch of ‘How to be a Chief Risk Officer‘, written by industry expert Jennifer Geary. Following on from the success of her first book on the COO role, this book de-mystifies the CRO role by breaking it into its constituent parts and outlining the requirements in the current day. Drawing on industry standards and enriched with expert insight and real-life current examples, it condenses a vast range of knowledge and experience into one accessible read.
Microsoft Entra
Watch this webinar to understand how quickly Microsoft Entra Permissions Management can bring your IaaS platform into compliance.
Discover:
- What Entra Permissions covers and how it integrates and what it mitigates.
- How it aligns to CIS/ NCSC/ NIST frameworks for compliance.
- How quickly it provides results.
SentinelOne Foundations of Cloud Security
Watch our SentinelOne Cloud Security Webinar where the expert’s take you through:
- Why traditional on-prem security approaches don’t work in the cloud.
- The key components of cloud security
- The importance of automated application control to protect cloud-native workloads with “lockdown” capabilities.
- How SentinelOne Singularity Cloud simplifies the security of cloud VMs and containers, providing runtime protection that detects anomalies in running workloads, and identifies and kills unauthorised processes
Microsoft Data Loss Prevention
Increased volumes of data and the spread of collaboration is leading to a significant burden for compliance teams and general data management.
Watch the webinar to discover:
- The main causes of data leaks and threats
- The stages of a DLP strategy
- DLP, Governance, and Compliance
- What is advanced threat protection
- Threat defence and Compliance
- Real-Life customer business case