Category: Advent IM News
News and information from the Advent IM team.
We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.
The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ...
Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.
Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.
The Public Sector Senior Information Risk Owner Training Course scheduled for Feb 5, is now full. Please select a future date from our program or speak to us about onsite training opportunities.
Read MoreShe starts her work as she means to go on with a definition, or rather several; ‘surveillance capitalism‘ as a ‘new economic order’ where the raw material is not steel or coal, but ‘human experience’. Read via Professional Security Magazine Online.
Read MoreToday is definitely a good news day and the Marketing team are happy to welcome a new member today. Olivia will be taking an active role in all social media and event planning in the coming weeks. Don’t forget to interact with her on Twitter and Facebook and show her what a great community the […]
Read MoreWe are pleased to announce our continued availability on the latest iteration of the UK Government framework, Digital Outcomes and Specialists 4 from Crown Commercial Services. Public Sector can find us under the Specialists lot – Cyber Security Specialist. Digital Outcomes and Specialists. You can access the buyers guidance here
Read MoreEllie Hurst, Head of Marketing Communication and Media at Advent-IM and a finalist in the Cyber Writer category in the Security Serious Unsung Heroes Awards 2019. Read Ellie’s blog at IT Security Guru
Read More**PRESS RELEASE** Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 27.08.19 MySecuritySurgery- one day security surgery launches Leading UK security consultancy launches convenient one day security surgery service for a range of physical, cyber and information issues Advent IM, the UK’s leading independent, holistic security consultancy, has launched a focused, one […]
Read MoreHow can infosec pros and data architects work together to support business goals and achieve a good level of cyber security? For information security professionals, collaborating with data architects ought to be an absolute imperative, and done well, has many benefits. Read full story.
Read MoreWhat strategies can information security professionals use to shift focus from GDPR fines to enabling business gains and success, changing the way data is used, and aligning data privacy with business purpose? Read full story.
Read More**PRESS RELEASE** Media Contact: Ellie Hurst +44 (0) 121 559 6699, bestpractice@advent-im.co.uk Date : 02.07.19 Advent IM cyber security services now available for procurement via G-Cloud 11 The UK’s leading independent, holistic security consultancy announced today they are continuing their relationship with Crown Commercial Services (CCS) and services will be available to procure directly through […]
Read MoreThis article is to introduce some of the key themes and explore the impact on our lives. In part one we will look at terrorism and crime vs. cyberterrorism and cybercrime, within the definitions above we can start to look at recent events and consider how we classify them. We will also examine the way […]
Read More