Episodios

  • 2025 UK Cyber Breached Survey: What need to know - What you need to do
    Jun 3 2025
    Business Leaders Cyber Briefing - Episode 12: Key Takeaways

    What You'll Learn from This Episode

    Trish and Tom from Cool Waters Cyber break down the 2025 Cyber Security Breaches Survey findings to help UK financial services leaders understand their current risk landscape and improve their cyber defenses.

    Critical Insights for Business Leaders

    Your Risk Profile is Higher Than You Think

    • 74% of large businesses and 67% of medium businesses experienced cyber incidents
    • Finance and digitally intensive sectors face elevated risks
    • Ransomware attacks have doubled, now affecting 1% of all businesses (19,000 organizations)

    Phishing Remains Your Biggest Threat

    • 85% of breached businesses were hit by phishing attacks
    • Even failed attempts drain significant staff time
    • AI-enhanced scams are making phishing more sophisticated and harder to detect

    Financial Impact Can Be Severe

    • Average breach costs range from £1,600 to £8,260 depending on severity
    • Cyber-facilitated fraud averages £5,900 per incident
    • Repeat attacks are common—affected businesses face an average of 30 incidents annually

    Key Action Items

    Strengthen Board Accountability

    • Only 27% of businesses have a board member explicitly responsible for cyber security
    • Finance sector performs better (57%) but still has room for improvement
    • Make cyber security a standing board agenda item

    Improve Incident Response Preparedness

    • Just 23% of all businesses have formal incident response plans
    • Only 39% of affected businesses report incidents externally
    • Develop and regularly test your incident response procedures

    Implement Proven Frameworks

    • Use the UK Cyber Governance Code of Practice's five principles as your foundation
    • Consider IASME Cyber Assurance for comprehensive governance alignment
    • Start with Cyber Essentials for essential technical controls

    Bottom Line

    The episode demonstrates that while cyber threats are intensifying, businesses with structured governance and incident response capabilities are better positioned to minimize impact. The key is moving from reactive to proactive cyber security management through proven frameworks and clear board-level accountability.

    Next Steps: Assess your current cyber governance against the five principles, ensure you have formal incident response plans, and consider certification standards like Cyber Essentials or IASME Cyber Assurance to systematically strengthen your defences.

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    20 m
  • How to fast-track the UK Cyber Governance Code of Practice using IASME Cyber Assurance
    May 8 2025

    Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance

    In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response, the UK government (via DSIT and NCSC) has introduced the voluntary Cyber Governance Code of Practice to guide boards and directors.

    The Code distils five key principles for effective cyber governance: Risk Management, Strategy, People, Incident Planning & Response, and Assurance & Oversight. However, implementing these practices can be a challenge.

    Our deep dive focuses on a pragmatic roadmap to implement the Code: the IASME Cyber Assurance standard. Formerly known as "IASME Governance", this government-backed standard is comprehensive yet accessible, developed with UK government support as an alternative to more complex standards like ISO/IEC 27001.

    Using IASME Cyber Assurance to implement the Code offers several benefits:

    Integrated Approach: It delivers both the Cyber Governance Code's requirements and the technical controls of Cyber Essentials in one unified effort, avoiding duplicate work.

    Structured Guidance: IASME provides detailed guidance, templates, and a structured question set to lead you through implementing controls, so you don't have to "reinvent the wheel".

    Comprehensive Coverage: The standard covers technical controls, risk management, data protection (like GDPR), and regulatory compliance.

    External Assurance: It culminates in an independent certification, providing tangible proof to stakeholders that your cyber governance meets a national standard.

    Learn how following a structured roadmap using IASME can help organisations achieve significant cyber maturity relatively quickly, often within ~3–6 months to certification.

    Implementing these steps can be challenging, which is why partnering with an NCSC-accredited Cyber Advisor can be invaluable. Advisors, like our sponsor Cool Waters Cyber, provide expert gap analysis, hands-on remediation support, plain-English communication, project management, and certification liaison. They offer a clear, pragmatic roadmap and help streamline the process, ensuring you meet the standards effectively.

    Cool Waters Cyber offers a comprehensive service to help boards implement the Cyber Governance Code of Practice. They provide tailored support backed by real-world experience and plain-English advice.

    Ready to strengthen your cyber governance? Cool Waters Cyber can help your firm implement the new code.

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    20 m
  • Unpacking the UK Cyber Governance Code of Practice
    Apr 28 2025

    Tune into this episode for a deep dive into the UK government's Cyber Governance Code of Practice. This Code is a crucial resource designed specifically for boards and directors. Understanding it can significantly benefit your organisation.

    By listening, you will gain insights into:

    Why cyber governance is essential for modern businesses and organisations. Digital technologies are deeply embedded in most businesses, and critical operations often rely on them. Cyber risk is a material risk for almost all organisations.

    The critical role of boards and directors in managing digital risks and protecting their organisations from cyber attacks. Governing cyber risk requires strong engagement and action at a leadership level.

    How the Code helps protect your organisation's financial viability. Effective management of cyber risks is crucial, and building cyber resilience is key to recovering from harm caused by cyber events.

    What the Cyber Governance Code of Practice is and how it sets out the most critical governance actions that directors are responsible for. It shows how boards and directors can build resilience to a wide range of cyber risks.

    Who should use the Code: It's tailor-made for boards and directors of both public-sector and private organisations, especially medium and large ones. While not specifically for small organisations, they play a critical role in UK economic resilience and should seek to implement the Code's principles.

    How the Code helps manage cyber risks effectively and reduce the likelihood and impact of cyber attacks. Cyber incidents can lead to major impacts like loss of income, damage to customer trust, or costly remedial action.

    How the Code fits into a wider government support package. It is underpinned by resources such as Cyber Governance Training and the Cyber Security Toolkit for Boards, which help strengthen understanding and support implementation.

    The key areas covered by the Code, including Risk Management, Strategy, People, Incident Planning, Response and Recovery, and Assurance and Oversight, detailing specific actions for each area.

    Understanding the minimum standards for managing cyber risk, especially when the Code is used alongside Cyber Essentials, a government-backed certification scheme.

    Understanding the principles and actions outlined in the Code of Practice is crucial for effective governance and protecting your organisation in today's digital landscape

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    13 m
  • The Quantum Revolution and the death of encryption
    Apr 1 2025

    Is your organisation ready for the quantum revolution? This episode delves into the looming threat of quantum computing to current cybersecurity, explaining how powerful quantum computers could break widely used encryption like RSA and ECC, potentially by the early to mid-2030s. Understand the "harvest now, decrypt later" attacks that could expose your sensitive data in the future.

    This episode highlights the critical risks to UK businesses, especially in finance and the public sector, including the potential collapse of secure transactions, compromised citizen data, and threats to critical infrastructure. Learn about the UK's National Cyber Security Centre (NCSC) guidance and their 2035 deadline for migrating to quantum-resistant cryptography.

    Discover the essential steps business leaders need to take now to prepare for a post-quantum world, including raising executive awareness, assessing cryptographic usage, adopting crypto-agility, and planning for the transition to Post-Quantum Cryptography (PQC) standards recommended by NIST and the NCSC. For financial institutions, the episode also touches upon PCI-DSS compliance implications. Don't wait until it's too late – future-proof your organisation by understanding and acting on the quantum threat today..

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    15 m
  • What are Passkeys?
    Mar 24 2025

    Passwords are out, and passkeys are in! But what exactly are passkeys, and why should business leaders care? In this episode, we break down passkeys in plain English—no tech jargon, just clear and practical insights.

    You'll learn:
    ✅ What passkeys are and how they work
    ✅ Why they’re more secure (and easier) than passwords
    ✅ How passkeys can protect your business from phishing and credential theft
    ✅ Why major companies like Google, Microsoft, and Apple are already making the switch

    With upcoming Cyber Essentials changes likely to push businesses toward passkeys, now is the time to get ahead of the curve. Tune in to discover how passkeys can make life easier for your employees and keep your business safer.

    #GetCyberSorted #Passkeys #CyberSecurity

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    21 m
  • From Hard Hats to Firewalls: Why Cyber Safety is the Next Big Construction Risk
    Mar 19 2025

    🔹 Episode Overview:

    For decades, the construction industry has made physical safety a top priority. Over time, mental well-being has also been recognised as a critical part of workplace safety. But now, a new challenge is emerging—one that many construction businesses aren’t prepared for: Cyber Safety.


    In this episode, we discuss the findings of our latest white paper on the evolution of safety culture in construction, revealing how cyber risks are becoming just as important as traditional workplace hazards. We’ll unpack:


    ✅ How health and safety evolved from a compliance burden to a core business value.

    ✅ The growing link between mental well-being and job site safety—and how stress can increase the risk of accidents.

    ✅ Why cyber threats (like ransomware, phishing, and invoice fraud) are now a critical risk to construction firms.

    ✅ How construction companies can apply lessons from traditional safety culture to build a strong cyber safety mindset.


    We also introduce our 6-Point Cyber Safety Action Plan, a practical guide to help construction firms protect their people, projects, and profits from cyber threats.


    🔹 Key Takeaways:

    ✔️ Cyber attacks are increasing in the construction industry, but most firms are unprepared.

    ✔️ Employees need to be trained to spot cyber threats just like they spot physical hazards.

    ✔️ Cyber safety should be integrated into daily briefings, safety reports, and leadership discussions.

    ✔️ The best way to avoid cyber attacks is to build a culture of cyber awareness.


    🔹 Get the Full Report:

    Want the complete insights? Download the full white paper, which includes the 6-Point Cyber Safety Action Plan and real-world strategies for construction firms.


    📥 [Download Your Copy Here]


    🔹 Who Should Listen?

    👷 Construction & engineering leaders

    🛠️ Health & Safety professionals

    💻 IT & Cybersecurity teams

    🏗️ Contractors & site managers

    📈 Business owners in the built environment


    🚀 Tune in and learn how to future-proof your construction business with cyber safety!

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    20 m
  • Cyber Essentials - all the changes coming in 2025
    Mar 11 2025

    Join Trish and Tom as they explain what the UK Cyber Essentials scheme is, how it will benefit your business and the changes coming to the scheme from April 2025.

    Whether you already have Cyber Essentials and will need to renew after the changes come into effect or are considering going for the certification for the first time - this is essential listening.

    Always in plain English, always short and to the point - this is the Business Leaders Cyber Briefing from Cool Waters Cyber.

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    19 m
  • PCI-DSS - What do you need to do?
    Feb 7 2025

    If your business processes card payment transactions you need to be PCI-DSS compliant. This episode provides an introduction to PCI-DSS and along the way explains many key cyber security concepts that apply to all businesses.

    This podcast episode discusses PCI DSS, a global information security standard for organisations that handle branded credit cards from the major card schemes. The episode focuses on two key areas: scoping and segmentation.

    Scoping is the process of identifying all the systems, people, and processes that need to be included in a PCI DSS assessment. This is crucial because it determines which parts of an organisation’s infrastructure are subject to the PCI DSS requirements. Accurately determining scope helps organisations focus their security efforts and resources where they are most needed. The episode provides a detailed breakdown of the scoping process, including:

    • Identifying all payment channels and how cardholder data is received.
    • Documenting the flow of cardholder data and the systems involved.
    • Identifying any systems, processes, and personnel that can interact with or impact the cardholder data environment.

    The episode emphasises the importance of considering all connected systems and the potential risks if these systems are overlooked during scoping.

    Segmentation is a security strategy that involves isolating the cardholder data environment (CDE) from other parts of the network. Effective segmentation can significantly reduce the scope of a PCI DSS assessment, making compliance easier to achieve and manage. The episode discusses different segmentation approaches and their impact on PCI DSS scope, particularly in the context of shared services like directory services. It stresses that segmentation should be part of a holistic security strategy and not a replacement for securing the entire infrastructure.

    The episode concludes by highlighting that effective scoping and segmentation can significantly reduce the risk of data breaches and streamline PCI DSS compliance efforts. It encourages business leaders to engage with their security teams to ensure a thorough understanding of these concepts and their impact on the organisation's overall security posture.

    Business Leaders Cyber Briefing is produced by Cool Waters Cyber, a UK based cyber security firm who have been protecting businesses across 3 continents since 1999. We are an NCSC Assured Service Provider and Cyber Advisor. To learn more: www.cool-waters.co.uk

    Need help with Cyber Security?

    Speak to Cool Waters Cyber - NCSC assured Cyber Advisors and Cyber Essentials experts - www.cool-waters.co.uk

    Más Menos
    19 m