01603 339550 [email protected]
  • Facebook
  • X
  • Facebook
  • X
CyberScale
  • Home
  • Executive Coaching
  • Services
    • Fixed Price Services
    • Services for Micro Business
      • One Day Cyber Assessment
      • Cyber Essentials
    • Services for SME’s
      • Security Assessments
      • Cyber Essentials Advisory
      • Virtual CISO
      • Remote Working Security
    • Services for Larger Business
      • Security Assessments
      • Incident Response Planning
      • Virtual CISO
    • Services for CISO’s & vCISO’s
      • Cyber Security Policies
      • ISO 27001
      • Incident Response Exercises
  • Training
    • Bespoke Cyber Security Training
    • Cyber Security Staff Awareness Training
    • Cyber Security Training for Business Owners & Leaders
    • Cyber Security Incident Response Planning Workshop
    • Cyber Security Training – Preparing for Cyber Essentials
    • Cyber Security Training – Preparing for ISO 27001 Certification
  • Info
    • Cyber Security Events
    • Meet the Team
    • Legals
  • Contact
  • Resources
    • Knowledge Centre
    • Cyber Security Blog
    • Cyber Security Videos
      • “On the sofa” chat with Professor Buck Rogers
    • Cyber Security Case Studies
    • Cyber Cheat Sheet
    • Cyber Maturity Scale
    • Service Descriptions
    • CyberScale Affiliations
Select Page

An introduction to DORA (Digital Operation Resilience Act) by Professor Buck Rogers

by Darren Chapman | Jun 21, 2023 | Articles, Uncategorized, Business Leadership, Cyber Security Regulations

Do you know about DORA? How familiar are you with DORA? And no, we don’t mean the young explorer we were all subjected to by our children! DORA or Digital Operation Resilience Act is an EU regulation.  Whilst DORA is not a law in the UK, there is a strong possibility...

Hiring a vCISO – their responsibilities and the benefits

by admin | May 16, 2022 | Articles, vCISO, Business Leadership, Cyber Security Consultancy

In previous blog posts we’ve explored whether hiring a direct resource to support your cyber security strategy is the best approach, or whether outsourcing this role meets your needs.  Now let’s dive in a little deeper and look in to how putting in place a vCISO...

Video – Understanding the importance of cyber security training

by admin | May 3, 2022 | Articles, Cyber Security Culture, Cyber Security Training, Business Leadership, Cyber Security Consultancy, Cyber Security Planning

Cyber training is a powerful tool available to all organisations. When building cyber security defences it’s important to ensure that one of your greatest protective assets, your people, are invested in and able to do everything possible to protect valuable...

Cyber Security Leadership

by admin | Apr 7, 2022 | Articles, Cyber Security Training, Incident Response Management, Business Leadership

Let’s take a quick look at cyber security leadership…Here’s an interesting question to ponder for a few minutes.  How much value do you place on 3 hours of your time as a business or organisational leader? Maybe you thought along the lines of “that’s...

Cyber security in the recruitment industry

by admin | Mar 21, 2022 | Articles, Information & Data, Cyber Security Opinion, Business Leadership, Cyber Security Planning, Supply Chain

Cyber criminals like to be able to target organisations where they can access large amounts of sensitive information and have a deep impact with the attack – the recruitment sector is a prime example.  Candidate data is the most valuable intellectual property asset...

CyberScale & Natwest Business discuss why cyber security is important for smaller businesses

by admin | Mar 10, 2022 | Articles, Past Events, Business Leadership, Cyber Security Planning

In the latest edition of Talking Business with Andy Gray, Local Enterprise Manager at Natwest Business our Director & Principal Consultant Darren Chapman talks about why cyber security is really important and what smaller businesses can do to better protect...
« Older Entries

Recent Posts

  • Building a Human Firewall: The Role of Cyber Awareness Training in Organisational Security
  • Keeping Your Patient’s Data Safe: Essential Cyber Security for Health and Social Care
  • White Teaming
  • Supply Chain and 3rd party risk management
  • Cyber Insurance benefits and limitations

Archives

  • September 2024
  • May 2024
  • March 2024
  • February 2024
  • January 2024
  • June 2023
  • March 2023
  • December 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • July 2020
  • April 2020
  • March 2020
  • October 2019
  • April 2018
  • September 2017
  • August 2017
  • July 2017

Categories

  • Articles
  • Information & Data
  • Uncategorized
  • Cyber Security Culture
  • Cyber Security Opinion
  • Future Events
  • Cyber Security Planning Cyber Security Consultancy
  • Past Events
  • vCISO
  • Cyber Security Training
  • Thought Leadership
  • Ransomware
  • Incident Response Management
  • Business Leadership
  • Cyber Security Policies
  • Remote Working
  • Cyber Security Consultancy
  • Cyber Security Planning
  • Cyber Security Regulations
  • Cloud Security
  • Supply Chain
  • Building a Human Firewall: The Role of Cyber Awareness Training in Organisational Security
  • Keeping Your Patient’s Data Safe: Essential Cyber Security for Health and Social Care
  • White Teaming
  • Supply Chain and 3rd party risk management
  • Cyber Insurance benefits and limitations
  • “On the sofa” chat with Professor Buck Rogers
  • An introduction to DORA (Digital Operation Resilience Act) by Professor Buck Rogers
  • Small Business Security – Introducing One Day Cyber Assessments
  • LastPass Security Incident – What should you do?
  • Securing the Internet of Things
  • Cyber security risks in the biotech and pharmaceutical industry
  • Hiring a vCISO – their responsibilities and the benefits