INSPIRING WOMEN IN TECH

Women making an impact in technology   Women have been making an impact in technology from its earliest developments, with women cited as being the first computer developers (Ada Lovelace), having invented WIFI (Hedy Lamarr), and boasting the title Mother of the Internet (Radia Perlman). We continue to make an impact in the 21st century [...]
Continue Reading

THE KEY TO A SUCCESSFUL CLOUD SECURITY STRATEGY

What every security and compliance team needs to consider   In the cloud, everything is bigger, better, and faster. Yet adapting to the speed of change can be an uphill battle for security and compliance teams. Mobius Consulting recently hosted a webinar led by Cloud Security Governance experts Amanda Hechter and Sven Mueller, where we [...]
Continue Reading

THE ADVANTAGES OF CYBER INSURANCE – CONFERENCE HOSTED BY ISACA

Learn how Cyber Insurance can Impact your Incident Response Framework   Over the last few years, Cyber Insurance has evolved. Today it is a standalone product that is customised for your business's needs, covering anything from data breaches to ransomware. Learn how Cyber Insurance can impact your Incident Response Framework with Raymond du Plessis and [...]
Continue Reading

THE EVOLUTION OF THREAT INFORMATION: FROM OPEN SOURCE TOOLS TO THREAT PROFILING – IN PARTNERSHIP WITH MOBIUS BINARY

Learn how your organisation can become proactive against Cyber Security threats using tools and strategies that will boost your preparedness.   Mobius Consulting's Cyber Security specialists, Tshego Tshifhango and Bharat Bhanji, joined Mobius Binary's Lead Security Analyst, Robert Len, for a deep dive into the Evolution of Threat Information. Tshego Tshifhango, Senior Consultant from Mobius [...]
Continue Reading

PRACTICAL TIPS AND BEST PRACTICES TO MATURE YOUR TPRM, IN PARTNERSHIP WITH PHINITY RISK SOLUTIONS

Learn how to Accelerate Your Third Party Risk Management Maturity Now more than ever, companies are turning to Third Parties for a strategic edge that will take their business to the next level. These Third Parties will bring benefits and potentially risks, and that is why sustainable Third Party Risk Management (TPRM) processes should be an essential [...]
Continue Reading

THE LONG ROAD TO PRIVACY

ALL OF YOUR MOST PRESSING INFORMATION PRIVACY QUESTIONS ANSWERED Are you intimidated by new Privacy laws and unsure where to start the Privacy compliance process, or are you facing obstacles in your Privacy journey? Or do you already know exactly where you’re headed and what steps to take? Roelien Howell, Principal Consultant at Mobius Consulting, [...]
Continue Reading

THE TRIPLE P’s OF PRIVACY: PRIVACY PROJECT PITFALLS

Avoid these three privacy pitfalls and safeguard your organisation’s information. In this webinar, Roelien Howell, Principal Consultant at Mobius Consulting, and Candice Jackson, Managing Consultant, explain and unpack the subject of privacy, common privacy pitfalls, and detail solutions for your organisation’s privacy needs.   INTERESTED IN FUTURE EVENTS?   Submit your details below and we [...]
Continue Reading

WHY IS YOUR TPRM PROGRAMME FAILING?

A dependence on third parties exposes your organisation and employees to greater cyber security risks. It is imperative, then, that your organisation understands the risks, how to avoid them, how to respond to them, and how to better manage its third parties. Malcolm Parker, Third Party Risk Management Service Leader at Mobius Consulting, breaks it [...]
Continue Reading

TIE TOGETHER AND BOOST YOUR THIRD PARTY RISK MANAGEMENT PROCESSES IN PARTNERSHIP WITH PHINITY RISK SOLUTIONS

On 8 October 2020, Phinity Risk Solutions partnered up with Mobius Consulting an hosted a webinar about the benefits of automating third party risk management processes. Organisations are increasingly reliant on third-parties to gain a competitive edge and this makes third-party risk and compliance a significant board level concern. During this webinar you will learn [...]
Continue Reading

WE HOSTED AN IDENTITIES IN THE FUTURE EVENT WITH SAILPOINT AND CYBERIAM

As the number and types of users accessing your data increases in this modern and ever complex world, managing these identities and limiting their access to only what is necessary, is one of the many issues to solve in the identity space. Add outsourcing, cloud services, dev/ops and Agile to the mix, this gets even […]

Continue Reading