Category Archives: Technology

de Novo Solutions Launches Next-Generation Testing as a Service™ (TaaS™) Practice

Offering Automated, Flexible, and Secure Software Testing Solutions

 

de Novo Solutions, a multi-award-winning Welsh technology company specialising in delivering personalised, data-driven digital experiences across Finance, Procurement, HR, and Payroll functions, has announced the launch of its next generation Testing as a Service™ (TaaS™) practice.  This new offering aims to redefine software testing by providing businesses with automated, flexible, and on-demand solutions designed to accelerate innovation and enhance software quality.  By freeing up development teams’ time and resources, TaaS™ enables them to adopt the latest innovations quickly and confidently. With improved software quality, organisations can fully embrace the continuous release cycle integral to the cloud-based Software as a Service (SaaS) delivery model.

The TaaS™ practice provides a comprehensive suite of services, including Systems Integration Testing, User Acceptance Testing, and Regression Testing. By integrating best-in-class test automation, de Novo’s TaaS™ practice reduces risk and accelerates testing cycles, offering businesses the flexibility to scale efforts as needed.

With de Novo’s new TaaS™ practice, organisations can unlock a range of benefits that ensure optimal quality and efficiency in their software testing processes:

  • Expert-Led Team: Collaborate with knowledgeable test practitioners who bring a wealth of experience and insight.
  • Quality-Assured Testing Processes: A comprehensive approach that guarantees quality at every stage.
  • Automated & Configurable Testing Services: Leverage cutting-edge automation tools customised to fit specific testing requirements.
  • Complete Test Management: From planning to close out, ensuring seamless management of all testing processes.
  • Unified Data and Reporting: Clarity and consistency throughout the software testing lifecycle.

Designed to tackle the complexities and demands of modern software testing, de Novo’s TaaS™ practice offers a flexible and efficient solution, delivered by experts, to meet the needs of today’s fast-paced market.  Unlike traditional testing services, de Novo’s TaaS™ practice enables businesses to collaborate with test practitioners to create bespoke services, eliminating fixed costs and alleviating the burden on in-house resources. This approach empowers organisations to manage their testing needs effectively with a trusted partner while optimising resources, budget, and time.

Lisa Chamberlain, Head of Testing Services at de Novo Solutions, said, “The launch of our TaaS™ practice represents a significant step forward in providing businesses with modern, adaptable testing solutions. By integrating best-in-class test automation into our software testing processes, we simplify the adoption of new features within Oracle. This integration enables our clients to accelerate innovation and significantly reduce testing risks. Additionally, it streamlines testing cycles, driving their growth and setting a new standard for quality and efficiency in software testing.”

As de Novo Solutions continues to lead digital transformation efforts across Finance, Procurement, HR, and Payroll functions, the introduction of its TaaS™ practice reinforces the company’s commitment to driving innovation and delivering industry-leading, data-driven solutions for modern businesses.

For more information on how de Novo Solutions can help enhance software quality and accelerate development processes with its new TaaS™ offering, visit www.de-novo-solutions.com/taas or  contact Lisa Chamberlain lisa.chamberlain@de-novo-solutions.com to arrange a consultation.

Headquartered in Langstone, South Wales, de Novo Solutions is at the forefront of digital transformation innovation in the experience economy, having successfully developed and introduced a range of new solutions to the market since its official launch in 2021, including its industry cloud solutions, ‘Odyssea™’ and its next generation managed services offering, ‘Value as a Service™ [VaaS™]’ for Oracle Cloud and ServiceNow applications.

For more information, visit: https://www.de-novo-solutions.com

 

New LinkedIn research surveying more than 2,000 UK professionals reveals that the rapid pace of change at work is putting a strain on businesses.

LinkedIn’s research reveals that more than half (56%) of UK professionals feel overwhelmed by how quickly their jobs are changing, which is particularly true of the younger generation (70% of 25-34 year olds), while 47% say expectations are higher than ever.

The data reveals that:

  • AI is leading the way when it comes to the challenges and changes professionals are navigating. The top workplace changes they cited experiencing the most included: 
    • Increased focus on understanding and integrating AI into daily work (26%)
      • Half (50%) of UK workers predict that AI will significantly impact how they work within the next five years
    • Struggling to keep up with upskilling and reskilling demands (25%)
    • Successfully working at home or remotely (22%)
  • Career confidence is down: 
    • 45% are worried about being left behind in their career due to how quickly their job and work is changing.
    • 56% agree that relying on past experience is no longer enough to succeed
  • Amidst the change, UK professionals see the opportunities AI can bring:
    • 59% of professionals are looking for more guidance at work
    • And just over a quarter (26%) say their organisation is struggling to adapt to all the shifts.
    • But 30% of UK professionals agree that AI will create more opportunities by making them more efficient.

Janine Chamberlin, UK Country Manager, at LinkedIn said: “The world of work has undergone huge change over the last few years – from embracing adoption of AI in the workplace, to juggling shifts in hybrid and remote working, right through to managing multi-generational teams. 

We’re seeing that professionals are understandably feeling overwhelmed and they’re looking to their employers for guidance. For business leaders, operating in an environment of constant change means a renewed focus on future-proofing their teams and businesses. Communication will be key as leaders strive to keep employees engaged and focused on learning, while also delivering growth for their organisation.”

 

New Pioneering Report Reveals the Realities of UK University’s Cyber Defences

CyPro, known for taking care of cyber security for high-growth companies, have released a new report, “Degrees of Security”. The report, developed through vital research with 22 leading UK Universities, provides a thorough analysis of how UK Universities are currently structuring, funding, and resourcing their cyber security teams and capabilities. Are UK Universities setting themselves up for success or failing to keep pace with the building cyber threat?
CyPro’s “Degrees of Security” report is a timely and significant contribution to the discourse on cyber security in the higher education sector, highlighting the urgency of addressing these emerging threats. The insights have identified fundamental gaps in how some Universities are approaching their cyber security. It provides pragmatic strategies tailored to the unique needs of higher education institutions to try and ensure they keep pace with the changing cyber threat landscape.
The report cites that the wider macro-economic environment is worsening the risk position for UK Universities as they face unprecedented financial challenge from public funding cuts, student loan repayment thresholds, tuition fee caps, loss of EU research funding and increasing global competition for students.
This is pushing Universities to broaden their commercial horizons and quickly pivot to new business models. New partnerships, overseas expansion and uninhibited data sharing for better research collaboration are all significantly increasing University’s risk profile at a time when they are becoming increasingly vulnerable.
The report also identifies several emerging opportunities for universities to strengthen their cyber security. As Universities respond to the wider financial pressures on the sector, adapting their growth strategies towards trans-national education channels and partnership models, there is an opportunity to update identity governance systems ready for this expansion, not only enabling university growth but also improving the digital experience of students both at home and on international campuses.
Jonny Pelter, Partner at CyPro said
“Universities are custodians of vast amounts of highly sensitive data and intellectual property, often with national security consequences, making them prime targets for cyber attacks. Our “Degrees of Security” report provides academic institutions with the insights necessary to re-evaluate their own security posture and make corrections in strategic approach to keep pace with the threat. It is an essential resource for anyone charged with the responsibility of safeguarding the digital assets of their University.”
CyPro is a new and exciting cyber security partner, known for taking care of cyber security for high-growth companies, at every stage of their journey. Their mission is to provide peace of mind to small and medium-sized enterprise (SME) leadership teams, enabling them to focus on growth in the knowledge that their digital assets are safe and secure. CyPro are expert in supporting the unique needs of academic institutions and other high-growth organisations, enabling them to scale their businesses securely.

New Pioneering Report Reveals the Realities of UK University’s Cyber Defences

CyPro, known for taking care of cyber security for high-growth companies, have released a new report, “Degrees of Security”. The report, developed through vital research with 22 leading UK Universities, provides a thorough analysis of how UK Universities are currently structuring, funding, and resourcing their cyber security teams and capabilities. Are UK Universities setting themselves up for success or failing to keep pace with the building cyber threat?
CyPro’s “Degrees of Security” report is a timely and significant contribution to the discourse on cyber security in the higher education sector, highlighting the urgency of addressing these emerging threats. The insights have identified fundamental gaps in how some Universities are approaching their cyber security. It provides pragmatic strategies tailored to the unique needs of higher education institutions to try and ensure they keep pace with the changing cyber threat landscape.
The report cites that the wider macro-economic environment is worsening the risk position for UK Universities as they face unprecedented financial challenge from public funding cuts, student loan repayment thresholds, tuition fee caps, loss of EU research funding and increasing global competition for students.
This is pushing Universities to broaden their commercial horizons and quickly pivot to new business models. New partnerships, overseas expansion and uninhibited data sharing for better research collaboration are all significantly increasing University’s risk profile at a time when they are becoming increasingly vulnerable.
The report also identifies several emerging opportunities for universities to strengthen their cyber security. As Universities respond to the wider financial pressures on the sector, adapting their growth strategies towards trans-national education channels and partnership models, there is an opportunity to update identity governance systems ready for this expansion, not only enabling university growth but also improving the digital experience of students both at home and on international campuses.
Jonny Pelter, Partner at CyPro said
“Universities are custodians of vast amounts of highly sensitive data and intellectual property, often with national security consequences, making them prime targets for cyber attacks. Our “Degrees of Security” report provides academic institutions with the insights necessary to re-evaluate their own security posture and make corrections in strategic approach to keep pace with the threat. It is an essential resource for anyone charged with the responsibility of safeguarding the digital assets of their University.”
CyPro is a new and exciting cyber security partner, known for taking care of cyber security for high-growth companies, at every stage of their journey. Their mission is to provide peace of mind to small and medium-sized enterprise (SME) leadership teams, enabling them to focus on growth in the knowledge that their digital assets are safe and secure. CyPro are expert in supporting the unique needs of academic institutions and other high-growth organisations, enabling them to scale their businesses securely.

Data Resilience and Protection in the Ransomware Age

By Sam Woodcock, Director of Cloud Strategy and Enablement at 11:11 Systems

Data is the currency of every business today, but it is under significant threat. As companies rapidly collect and store data, it is driving a need to adopt multi-cloud solutions to store and protect it. At the same time, ransomware attacks are increasing in frequency and sophistication. This is supported by Rapid7’s Ransomware Radar Report 2024 which states, “The first half of 2024 has witnessed a substantial evolution in the ransomware ecosystem, underscoring significant shifts in attack methodologies, victimology, and cybercriminal tactics.”

Against this backdrop, companies must have a data resilience plan in place which incorporates four key facets: data backup, data recovery, data freedom and data security.

Ransomware is Just Business

With ransomware being a low-risk, high-reward opportunity for criminals, as it requires little effort to access sensitive information and demand ransom, it is becoming an attractive career choice for some. It is on this basis that ransomware has evolved into a fully-fledged business with more operations starting up every week.  This is also fuelled by the increasing popularity of Ransomware-as-a-Service, a model where sophisticated threat actors develop and sell ransomware platforms to other threat actors.

With this rise in threat actors targeting businesses today, IT security can no longer be a problem for IT teams alone. Every decision is a commercial decision and will carry risk. And every person within an organisation has an important role in being the first line of defence and protecting a company from a breach.

From Passwords to Exploits

People make mistakes, and this makes them an attractive target for most threat actors. According to Mimecast over 70% of cyber breaches in 2023 were caused by human error. Advanced phishing attacks are more convincing than ever, making it harder for employees to distinguish between real and fake emails. It only requires a quick click of the button by a stressed, tired or disgruntled employee for threat access to gain a password that gives full access to the organisation’s data.

As such, while employees must be adequately trained to avoid falling victim to these phishing or ransomware attacks, this is merely the first step to improving a company’s security. However, it requires further security measures to be put in place to protect the organisation and its data.

Testing, Testing

Backups are considered the primary way to recover from a breach, but is this enough to ensure that the organisation will be up and running with minimal impact? Testing is a critical component to ensuring that a company can recover after a breach and provides valuable insight into the steps that the company will need to take to recover from a variety of scenarios. Unfortunately, many organisations implement measures to recover but fail on the last step of their resilience approach, namely testing. Without this step, they cannot know if their recovery strategy is effective.

Testing is a critical component as it provides valuable insight into the steps it needs to take to recover, what works, and what areas it needs to focus on for the recovery process, the amount of time it will take to recover the files and more. Without this, companies will not know what processes to follow to restore data following a breach, as well as timelines to recovery. Equally, they will not know if they have backed up their data correctly before an attack if they have not performed adequate testing.

Although many IT teams are stretched and struggle to find the time to do regular testing, it is possible to automate the testing process to ensure that it occurs frequently.  These tools will also provide a realistic view of how resilient the environment is to threats and provide a host of scenarios that could impact the business, helping to prepare for almost any incident.

From testing to reality

While some organisations are surprised that they have been breached, according to Sophos, 83% of organisations that experienced a breach had observable warning signs beforehand and ignored the canary in the coal mine. Further, 70% of breaches were successful and threat actors encrypted the data of the organisation to prevent access to it.

However, as threat actors aren’t using enterprise-grade tools to gain access to data, enterprises are effectively at an advantage if they test and retest regularly, and back up their data effectively. A good guideline for this is the 3-2-1 rule, which states that there should be at least three copies of the data, stored on two different types of storage media, and one copy should be kept offsite in a remote location. Businesses also stand to benefit from partnering with an organisation that can protect the network to defend against threats and has the expertise to help them to recover from an attack.

Shipley publish 20th anniversary edition of their business growth best practice model (BG3) – ‘ready for AI, but it’s still all about people’

Shipley, specialists in helping clients grow their business by winning more, larger competitive contracts, today published the 3rd edition of their best practice model.

The Capability Maturity Model for Business Growth, version 3 (BG3 for short), incorporates guidance on the application of generative AI to business growth and findings from a recent Shipley global research study on people practices – both with implications for senior leadership.

The simplicity of the model’s five by five matrix presentation belies the more than two decades of consulting experience and research studies that underpin it.

The five columns in the matrix represent the capability categories which organisations need to master in order to grow – these are:

  • Working with customers
  • Providing leadership and direction
  • Developing people
  • Having effective processes
  • Making sure the business has a supporting information infrastructure

The five rows then set out increasingly sophisticated (or mature) business growth practices, from the chaotic hero cultures at level 1, to the optimising approaches at level 5.

Findings from Shipley’s 2023 global research study on recruitment, retention and realising full employee potential have been reflected in updates to the developing people category.

BG3 also includes current and predicted use-cases for generative AI, from drafting proposal content, to supporting decision-making, developing competitive strategies, and in simulating likely customer evaluation scores. BG3 also includes a refresh of the whole model based on a decade of application experience.

Paul Deighton, Shipley board member and BG3 author, commented 

“BG3 has been designed to simplify the overwhelmingly inter-connected, many-moving-parts complexity of business growth so that priority improvements and investments are clear and actionable to senior executives”.

“We have to be ready for AI, but it’s still all about people.”

“Our clients are trying to win major business in the most competitive and complex environments. Our mission in Shipley is to help them succeed – BG3 is our latest contribution in achieving that goal”.

 

Book link:

https://www.shipleywins.co.uk/product/capability-model-for-business-growth/

Shipley’s 2023 global research study on recruitment, retention and realising full employee potential:

https://www.shipleywins.co.uk/global-survey-reveals-front-end-of-business-recruitment-challenges-outpace-staff-retention-concerns-among-senior-employers/

 

Unlocking the power of behavioural nudges to improve cyber security

Written by John Scott, Lead Security Researcher at CultureAI

In today’s digital landscape, managing security threats often hinges on how well organisations can identify and respond to risks in real time. While human errors are bound to happen, with the right technologies and processes, they don’t always have to pose a significant risk.

Unfortunately, when people make mistakes, they often go unnoticed until they result in an incident. This is where nudges can help, filling a crucial gap by intervening in risky behaviours automatically and efficiently. A well-executed security nudge can reduce Security Operation Centre (SOC) interventions and remediation times while reinforcing security policies, security culture, and best practices.​

What exactly is a nudge?  

Nudge Theory, popularised by Richard Thaler and Cass Sunstein in 2008, gained prominence as a cheap and effective method to influence behaviour change. The premise of this concept is that shaping the environment, known as choice architecture, influences individuals’ decision-making and allows them to maintain freedom of choice and feel in control of their decisions whilst being guided towards the ‘best’ solution.

The term ‘nudge’ has become a buzzword in cyber security over recent years, often mistakenly equated with ‘notifications’. While nudges can be used in different ways, overreliance can lead to ‘nudge fatigue’, overwhelming employees with dismissible reminders and notifications to complete training. To make the best use of them, nudges should aim to shift behaviours rather than simply notifying an employee of their actions.

Why do we need nudges in cyber security?  

When people are busy, they tend to be reactive, and reliant on system-one thinking, which is automatic and intuitive but more prone to errors. By sending a security nudge to employees at the point of risk, they are alerted in real time and prompted to shift to more logical, lower-risk, system-two thinking.

Incorporating nudges as part of a human risk management (HRM) strategy is an effective way to mitigate risks in real time, empowering employees precisely when it matters most. Nudges encourage employees to pause and think before making potentially risky security decisions, making them aware of the threat and empowering them to choose wisely. 

Nudge, not noise  

Nudging employees comes at a cost. Interrupting their workflow can hamper productivity, so a nudge must have a strong rationale. If you interrupt, there should be a specific, actionable step the employee can take to mitigate the identified risk. If the security team can fix the risk without interruption, they should. Repetitive or intrusive nudges will lead to nudge fatigue, causing employees to ignore them. 

Meet people where they are  

To ensure a nudge isn’t ignored, deliver it within the applications employees are already using, such as Slack, Teams, or their browser. Over time, nudges simplify decision-making for employees, requiring minimal cognitive effort to execute decisions without overthinking. 

Nudge people to make better decisions 

Rather than just leaving employees to navigate the safe use of SaaS and GenAI apps on their own, nudges can help establish guardrails and provide guidance in real time. For example, if the organisation has an approved GenAI solution, a good nudge can not only dissuade employees from using non-authorised sources, but it can also guide them towards a preferred solution. Nudges can help create a cultural shift towards proactive and engaged participation in cyber security practices. This approach not only streamlines security operations but also creates an environment where employees are empowered to make their own security decisions.

The Importance of Operational Resilience in Private Equity: Safeguarding and Enhancing Portfolio Value

By Sean Tilley, EMEA Senior Director of Sales at 11:11 Systems

In the dynamic world of private equity (PE), the ultimate goal is clear: maximise the value of portfolio companies to achieve strong returns on investment. Achieving this requires a multifaceted approach, where operational efficiency, financial growth, and strategic direction are all essential components. However, one often-overlooked aspect that can make or break the success of these investments is operational resilience.

Operational Resilience: “The ability of systems to resist, absorb, and recover from an incident that occurs during operation that may cause harm, destruction, or loss of ability to perform mission critical functions.”   – Computer Security Resource Centre

Operational resilience—particularly in the areas of security services and Disaster Recovery as a Service (DRaaS)—is crucial for safeguarding the long-term value of portfolio companies. In today’s environment, where cyber threats like phishing, ransomware, and unforeseen disruptions are ever-present, PE firms must ensure their portfolio companies are not just prepared for the worst but are positioned to thrive through it. This blog will explore why both cyber and operational resilience are vital and how it contributes to maintaining and increasing the value of PE investments.

Navigating an Evolving Risk Landscape

The risk landscape for businesses has evolved significantly in recent years. Cyber threats, ransomware attacks, data breaches, natural disasters, and global pandemics have all become part of the new normal. For portfolio companies, the potential impact of these risks is substantial. A major cyberattack or an extended operational disruption can lead to significant financial losses, reputational damage, and in extreme cases, the complete downfall of a business.

PE firms, with their focus on value creation, cannot afford to ignore these risks. Ensuring that portfolio companies have robust security measures and a comprehensive disaster recovery plan in place is no longer a nice-to-have; it’s a necessity.

Protecting and Enhancing Portfolio Value

Operational disruptions can lead to direct financial losses, but the secondary effects can be just as damaging. A security breach, for example, can erode customer trust, lead to regulatory fines, and significantly reduce the attractiveness of a company to potential buyers. For PE firms looking to sell or exit an investment, these factors can diminish the valuation of the company, reducing the overall return on investment.

Conversely, companies that demonstrate strong operational resilience are more attractive to potential buyers and partners. They are seen as safer investments, capable of withstanding and recovering from crises. This resilience not only protects the current value of the company but can also enhance it, leading to higher multiples at exit.

Cybersecurity as a Cornerstone

Cybersecurity is at the heart of operational resilience. With the increasing digitisation of business processes, the exposure to cyber risks has never been greater. PE firms must ensure that their portfolio companies have invested in cyber resilience which can include advanced security services like threat detection, incident response, and continuous monitoring.

By adopting a proactive approach to cybersecurity, companies can identify vulnerabilities before they are exploited and respond swiftly to any incidents that occur. This not only minimises potential damage but also demonstrates a commitment to protecting customer data and business operations—key factors in maintaining a company’s reputation and value.

Compliance and Regulatory Considerations

In many industries, cybersecurity is not just a matter of best practice; it’s a regulatory requirement. Failure to comply with data protection regulations such as GDPR in Europe or CCPA in the United States can result in hefty fines and legal repercussions. PE firms should ensure that their portfolio companies are fully compliant with all relevant regulations, as non-compliance can lead to financial penalties and damage to both the company’s and the PE firm’s reputation.

The Importance of Disaster Recovery

While cybersecurity is crucial, it is only one piece of the operational resilience puzzle. PE firms must also consider how their portfolio companies would recover from a catastrophic event, such as a natural disaster, a major cyberattack, or a system failure. This is where Disaster Recovery as a Service (DRaaS) comes into play.

DRaaS provides a cloud-based solution that ensures a company’s data and critical IT systems can be quickly restored after a disruption. This minimises downtime, reduces data loss, and ensures that business operations can continue with minimal interruption. For PE firms, investing in DRaaS for portfolio companies is an investment in ensuring that the company can weather any storm.

Cost-Effective Resilience

One of the key advantages of DRaaS is its cost-effectiveness. Traditional disaster recovery solutions often require significant capital investment in redundant infrastructure and dedicated recovery sites. DRaaS, on the other hand, leverages the cloud to provide a scalable, flexible solution that can be tailored to the specific needs of each portfolio company. This not only reduces costs but also allows for faster and more efficient recovery, further enhancing the company’s operational resilience.

Operational Resilience as a Competitive Advantage

In today’s fast-paced and unpredictable business environment, operational resilience is not just a defensive strategy; it’s a competitive advantage. Companies that can demonstrate strong resilience are better positioned to win new business, retain customers, and attract investment. For PE firms, this translates into higher valuations, more successful exits, and ultimately, greater returns on investment.

By ensuring that portfolio companies have invested suitably in security services and DRaaS, PE firms can protect their investments from unforeseen risks and enhance their value in the marketplace. In a world where operational disruptions are increasingly common, the ability to not only survive but thrive through challenges is what will set the most successful portfolio companies—and their PE backers—apart.

A Strategic Imperative for PE Firms

Operational resilience should be a top priority for any PE firm looking to maximise the value of its portfolio. By ensuring that portfolio companies are well-equipped with robust security services and effective disaster recovery solutions, PE firms can safeguard against potential threats and position their investments for sustained growth and success. In the end, the return on investment in operational resilience is not just measured in financial terms but in the stability, trust, and long-term viability of the portfolio companies themselves.

Best Ways To Protect Your Business in Cyber Security Awareness Month

With the world security outlook uncertain, there has never been a better time to consider if your business is really doing enough to ensure its survival.
Cyber security is an ever-essential consideration – and cutting corners can mean disaster.
The growing proliferation of cyber crime in recent years is on a scale that could be scarcely imagined a decade ago.
This year’s Cyber Security Breaches Survey, published by the Government, found that 50% of UK businesses reported having experienced some form of cyber security breach or attack in the past 12 months.
The figure is higher for medium and large organisations, with the figure rising to 70% and 74% respectively.
The most common type of is phishing, which refers to an attempt to steal sensitive information, often via email, was experienced by 84% of the businesses surveyed.
So reviewing how prepared you are is crucial for anyone running a business, large or small.
And October provides the perfect opportunity to do this, as “secure our world” is the theme for Cybersecurity Awareness Month this year.
There are numerous ways that criminals target businesses and Jack Hayes, the founder of The Cyber Security Speakers Agency , has helped support multiple businesses with strategies to mark Cyber Security Awareness Month.
“Cybersecurity Awareness Month is an ideal time for businesses to review their strategies as it is an international initiative designed to ensure that everyone is educated in online safety.
“It is designed to empower people to protect their data from cyber criminals and reminds us that there are simple and effective ways to keep yourself safe.
“This is a time of the year when organisations should be talking to their employees about cyber safety.”
Sharing his top five tips for best sparking discussions about the subject in the workplace, Jack said:
  • Encourage employees to become cyber security champions
  • Share details of events that could be useful in identifying future challenges
  • Circulate documents internally that will highlight issues and spark discussions
  • Promote education materials and resources freely provided by organisations and think-tanks
  • Hire a speaker to talk about aspects of cyber security or host a workshop
Data compiled by Champions Speakers, which is based on reviews and feedback from thousands of events shows the current top UK speakers for cyber security in 2024 to be:
  1. Keren Elazari – Voted in TED’s Most Powerful Ideas of 2014
  2. Sarah Armstrong-Smith – Chief Security Advisor for Microsoft
  3. Jamie Woodruff – Europe’s #1 hacker
  4. Lisa Forte – Named in the “Top 100 Women In Tech” list
  5. Misha Glenny – Expert on organised crime & cybersecurity, produced TV’s McMafia
  6. Chris Wylie – Prompted the Cambridge Analytica/Facebook data scandal
  7. Dr Jessica Barker – One of the top 20 most influential women in cybersecurity in the UK
  8. Baroness Joanna Shields – Former UK Minister for Internet Safety and Security
  9. Lord Jonathan Evans – Former UK director of domestic security and counterintelligence service
  10. Robert Hannigan – Launched the UK’s active cyber defence program in 2016
  11. Ben Owens – Former British Intelligence officer & Boss on Channel 4’s Hunted
  12. Greg van der Gaast – Founder of Creative Minds Consulting Group
  13. Joe Tidy – BBC’s first-ever cyber specialist journalist
  14. Professor Lisa Short – Co-Founder of P&L Digital Edge, ATaas LTD & Africa Agri Tech Ltd, named a Top 50 Thought Leaders and Influencers in the World.

Surrey County Council switches over to innovative new communications infrastructure, in partnership with FourNet and 4C Strategies

Surrey County Council (SCC) has completed a major upgrade to its communications infrastructure which will enhance delivery of key services to citizens.

A new telephony and contact centre project, delivered in collaboration with digital transformation specialists FourNet and 4C Strategies, has been successfully completed and launched – meeting extremely tight deadlines set by the council.

Switchover to the new system, which included 130 different council sites and 1,700 users, was completed in one weekend, without any interruption to services.

The project marks a significant milestone in the Council’s ongoing digital transformation strategy which will enable it to provide an enhanced experience to more than 1.2m residents across the county, with faster call handling times resulting in reduced waiting times.

SCC receives over 870,000 inbound calls every year – of which around 550,000 incoming calls will now go through the new Microsoft Teams telephony system, and around 240,000 calls to the Council’s contact centres.

Surrey CC customer service rep taking first call using new system

Liz Mills, Interim Director of Customer Digital & Change at Surrey County Council,said:

“Our telephony upgrade ensures efficient communication, benefiting our community as well as our teams. As an organisation, we are committed to ensuring that no one is left behind and will continue to harness technology to better serve our residents.

“I am immensely proud of our colleagues’ efforts on the day and their endeavours in the months and weeks leading up to the transition. This robust groundwork ensured that the project was completed in a timely manner without causing undue disruption for our customers.”

With the council’s existing communication systems nearing end of life, the project involved the integration of Microsoft Teams telephony and the deployment of NICE CXone contact centre technology across multiple locations.

Lorraine Juniper, Senior Responsible Officer at SCC, said: “The success of this project is a testament to the strong partnership between Surrey County Council, FourNet, and 4C Strategies. The collaboration has been exceptional, ensuring that the switchover was completed seamlessly.”

FourNet has developed unrivalled expertise in public sector digital transformation and counts more than 30 government departments and agencies among its public sector customers. The company was selected to lead this project via a competitive tender process.

Richard Pennington, CEO at FourNet, said: “By working so closely and successfully with 4C Strategies and Surrey County Council, we’ve ensured that we met some extremely tight deadlines, while enhancing the Council’s communication systems and streamlining processes for staff and the county’s residents.

“We have delivered a future-proof communication infrastructure that will support SCC’s mission to provide outstanding public services to all of its citizens.”

4C Strategies, known for its expertise in public sector transformations, provided strategic guidance, business case development, procurement support, and implementation advice, drawing on extensive experience from similar public sector projects.

The new systems have not only modernised SCC’s communication capabilities but have also provided the council with advanced analytics tools. These tools allow SCC to gain deeper insights into system usage, enabling them to optimise operations, enhance service delivery, and ensure that resources are allocated efficiently.

The project was driven by SCC’s commitment to improving service delivery and operational efficiency.

With a modern, flexible communication system now in place, the council is well-equipped to meet future challenges and expand its digital offerings to better serve its communities.