Sure Business attends this year’s Channel Islands Cybersecurity conference

event2

“We at Sure Business were pleased to support an event that seeks to connect our islands and highlight the growing threat of hackers and other cyber criminals. Guernsey and Jersey have synergy in terms of their financial services industries, governments, and statuses as offshore British territories. There is a huge amount that can be learned in terms of keeping our businesses and individuals safe from cyber-crime”

Paul Acton, Chief Business Officer

Sure Business has become a silver tier sponsor at this year’s Channel Islands Cybersecurity conference, with Chief Business Officer Paul Acton speaking as part of a panel of experts.

Paul’s contribution focused on how the Channel Islands need to come together to facilitate maximum digital security, reflecting Sure’s desire to keep all islanders connected. Sure Business has clients across the Bailiwick of Guernsey, Jersey, and the Isle of Man. As such, Paul was able to offer insight into how cybersecurity best practice can be shared and implemented across the Crown Dependencies.

The Cybersecurity conference is designed to bring together experts from across the Channel Islands at a forum to discuss trends, new threats, and new ways of mitigating cyber-crime while also offering an opportunity to network. This year, the event was held at the Pomme D’or Hotel in St. Helier on Tuesday 4 October.

More than 100 people from a range of industries attended the event. Along with notable organisations from Jersey, several Guernsey companies attended virtually to input on how the threat of cyber-crime is being handled across the Channel Islands. Key themes included how ransomware still presents the immense threat of data breaches and how AI is revolutionising the way cybersecurity products work, with some exciting new developments coming from providers such as OwlGaze and DeepInstinct.

It was also acknowledged that Sure’s cyber framework acts as an excellent foundation for tailoring business needs in terms of cybersecurity requirements. Sure uses the five-step cybersecurity plan consisting of identification, protection, detection, response, and recovery; a framework aligned with procedures from the National Cyber Security Centre. This approach, paired with education of all staff members, was identified as an effective way to combat the threat of cyber criminals.

Paul said: “We at Sure Business were pleased to support an event that seeks to connect our islands and highlight the growing threat of hackers and other cyber criminals. Guernsey and Jersey have synergy in terms of their financial services industries, governments, and statuses as offshore British territories. There is a huge amount that can be learned in terms of keeping our businesses and individuals safe from cyber-crime.

Cyber Security Consultant at Sure, Grant Mossman, who attended the event said : “Paul’s contribution to the panel made this need for collaboration clear, and the event was a great opportunity to speak to peers in cybersecurity to see what new products, solutions, and methodologies they are using. Sure Business remains committed to keeping our islands safe from cyber-crime and learning from others and staying abreast of the latest industry developments is very important, as we strive to offer industry leading solutions to the market”.

Contact us to find out how we can help you
and your business today

Contact us

 

Related articles

940X529 People at work 2

Helping businesses focus on what’s important

Michael O'Donnell shares some examples of how he has recently provided customers with a the right technology solution for their business.

767X575 Technology focus 3

Immutable S3 Data Storage – What’s all the Fuss About?

Malcolm shares how S3 storage and backup offers significant additional value, particularly where data immutability (tamper proof protection) is embedded within the solution.

767X575 Technology focus 1

Datacentre Security Standards

Both digital and physical datacentre security procedures must be in place by all organisations running infrastructure that uses and stores sensitive and private data. Here we discuss some of the security standards that should be in place.