Understanding Cyber Clear Cut Cyber Ltd
-
- Tecnologia
Helping you understand cyber and technology subjects in simple language.
-
Righting Wrongs on Risk
In the first of a four-part series on risk we examine what risk management means in the cyber world, how people get it wrong, and how to solve it. Featuring special guest, and Clear Cut Cyber risk expert, Matt.
If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website clearcutcyber.com
Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/ -
How to plan cyber incident response
Learn how to plan cyber incident response
We explain how to plan for cyber incident response. The elements that make up the plan, the stages that take place during cyber incident response, the key things to do ahead of an incident, and how to learn more.
If you want any cyber security support please get in contact with the team by email info@clearcutcyber.com or visit the website https://clearcutcyber.com
Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/ -
What is a CISO?
What is a CISO?
In this episode Toby and Tom are joined by a special guest - Dr Andy Grayland. Andy is an experienced CISO, and currently fills that role for Silobreaker. He joins the team to discuss what a CISO is, what the role entails, when you need one, and what he thinks the most important actions and skills are for a new CISO.
If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com or to learn more about Silobreaker go to Silobreaker.com.
Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/ -
Security Assessments
Security assessments
In this episode Toby and Tom discuss what security assessments are, different types of assessment, and how they are conducted. They also talk through some of the assessments they have conducted.
If you want any cyber security support please get in contact with the team via the website: clearcutcyber.com. Including free cyber security health checks for charitable organisations.
Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/ -
From Function to Fortification
From Function to Fortification: identifying and securing critical business functions
In this episode Toby and Tom discuss why understanding business impact is key to context for any cyber security programme, and a process for working it out.
If you want any cyber security support please get in contact with the team via the website: https://clearcutcyber.com or email info@clearcutcyber.com
Music is Green Lights by Jahzzar from the Free Music Archive and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/ -
Cyber Essentials Part 2 - Scope
Cyber Essentials
In this second part of the cyber essentials scheme we examine what the scope of it is, how you define your scope, and what is not in scope.
Further reading:
NCSC website: https://www.ncsc.gov.uk/cyberessentials/overview
IASME (NCSC partner): https://iasme.co.uk/cyber-essentials/
Music by Jahzzar and used under CC BY-SA 4.0 license: creativecommons.org/licenses/by-sa/4.0/