
FCA CP24/28: What’s changing and why security teams should act now
FCA CP24/28 will change how firms report operational incidents and manage critical third parties. What’s changing and why security teams should act now.
Talk to an expert +44 (0) 208 132 9267

FCA CP24/28 will change how firms report operational incidents and manage critical third parties. What’s changing and why security teams should act now.

Cyber incident response is not simply about fixing systems. It is about protecting the organisation as a whole when everything is under pressure.

Security attacks begin long before a breach. Learn how attackers assess risk, exploit people and places, and why converged security stops threats earlier.

Lost or stolen devices are a common cause of security incidents. A calm, methodical response in the first few minutes helps contain the situation and protects both personal and organisational information.

Website DDoS attacks aim to overwhelm systems, networks or applications so legitimate users cannot access them. Calm, structured action in the early stages can significantly reduce operational and reputational impact.

Vishing, or voice phishing, uses impersonation, urgency and confidence to manipulate people over the phone. A calm and structured response in the first few minutes can prevent account compromise, data loss or financial harm.

Phishing remains one of the most common ways attackers gain unauthorised access to systems, accounts and data. A calm, methodical response in the first few minutes can significantly reduce the impact.

Discover what the UK Cyber Security & Resilience Bill means for your organisation, who’s in scope, and how to prepare for new security and reporting requirements.

Black Friday might be all about big discounts, but it’s also become prime time for online scammers. In a new piece for Supply Chain Magazine, we explore how fraud has evolved far beyond suspicious emails – with criminals now using AI to build convincing fake shops, ads and reviews that are almost impossible to spot at a glance. The pressure of “only a few left” or “sale ends soon” makes it even easier for people to fall into the trap.
“With billions set to be spent in just a few days, Black Friday creates the perfect cover for criminals,” the article explains. “They rely on rushed decisions not technical tricks.”
Read the full piece to learn how modern Black Friday scams really work, the signs most people overlook, and the simple steps that can stop shoppers being caught out this season.

The recent cyberattack on Jaguar Land Rover (JLR) has sent shockwaves through the manufacturing sector. With production halted across the UK, China, Slovakia and India, and sensitive data affected, the incident shows just how quickly a single breach can disrupt an entire operation.
In a recent article published by Technology Magazine, Katie Barnett, Director of Cyber Security at Toro Solutions, was quoted highlighting the importance of spotting vulnerabilities across the supply chain early:
“Early detection of supply chain weaknesses is crucial to limiting the impact of such attacks.”
The attack also underscores the value of zero trust architecture in modern manufacturing, ensuring systems are designed to contain threats quickly rather than relying solely on traditional defences.
The full article explores the lessons JLR’s experience offers to businesses everywhere – from protecting operational technology to strengthening supplier networks – and provides practical guidance for avoiding similar disruptions.

In a recent podcast between Ocorian and Toro Solutions, Michael Harman and Peter Connolly discussed the increasingly complex risk landscape facing family offices today.

A construction company with 5 UK offices and remote construction sites, serving 157 end users, suffered a catastrophic outage caused by a power failure.