
FCA CP24/28: What’s changing and why security teams should act now
FCA CP24/28 will change how firms report operational incidents and manage critical third parties. What’s changing and why security teams should act now.
Talk to an expert +44 (0) 208 132 9267

FCA CP24/28 will change how firms report operational incidents and manage critical third parties. What’s changing and why security teams should act now.

Security teams are good at understanding risk, but many struggle is in getting that risk taken seriously by decision makers. This guide explains how to translate security risk into business terms that support better decisions and stronger resilience.

Every organisation runs on technology. It keeps teams connected, systems running and data flowing but that reliance on IT and cloud services comes with risk. That is why more organisations are turning to cyber security consulting.

Black Friday might be all about big discounts, but it’s also become prime time for online scammers. In a new piece for Supply Chain Magazine, we explore how fraud has evolved far beyond suspicious emails – with criminals now using AI to build convincing fake shops, ads and reviews that are almost impossible to spot at a glance. The pressure of “only a few left” or “sale ends soon” makes it even easier for people to fall into the trap.
“With billions set to be spent in just a few days, Black Friday creates the perfect cover for criminals,” the article explains. “They rely on rushed decisions not technical tricks.”
Read the full piece to learn how modern Black Friday scams really work, the signs most people overlook, and the simple steps that can stop shoppers being caught out this season.

Jaguar Land Rover (JLR) has been forced to halt production after a major cyberattack “severely disrupted” its operations worldwide. As the carmaker races to restore systems, experts warn the incident underscores the vulnerability of modern, digitised manufacturing.
Katie Barnett, Director of Cybersecurity at Toro Solutions, notes that such events highlight a critical blind spot: supply chain resilience.
“While third-party vendors drive efficiency, businesses must ask: Do partners have the right controls in place? Can infiltration be detected early enough to contain the damage?”
Read the full story to explore how the attack unfolded and what it means for operational technology and supply chain security across the automotive sector.

Discover why a cyber security review is essential for businesses of all sizes.

Human error is a leading cause of cyber breaches. Discover how effective cyber security training empowers employees to spot threats, prevent social engineering, and build a strong human firewall to protect your organisation.

Cyber security audits give executives clarity on risks, compliance, and resilience helping protect reputation, revenue, and investor confidence.

International investment services firm wanted a partner that could provide IT managed services, virtual CISO and security services.

A medium-sized financial services company sought assurance regarding the security measures taken by their third-party IT Managed Service Provider (MSP).

A medium-sized Internet Service Provider (ISP) utilising Microsoft 365 and Azure infrastructure had a specific requirement to enhance the security of their IT environment.