Latest Advisory

Beyond the Breach: Building Resilient IT Operations from the Inside Out – Webinar and Presentation Kit
CIOs must translate technical cyber risks into business language, utilising governance frameworks to engage stakeholders and secure shared enterprise resilience.

Beyond the Breach: Building Resilient IT Operations from the Inside Out – Webinar and Presentation Kit
CIOs must translate technical cyber risks into business language, utilising governance frameworks to engage stakeholders and secure shared enterprise resilience.
Canva Triples Prices Citing the Need to Pay for New AI Design Tools – AFR – 2 September 2024
Canva’s price hike, fuelled by heavy AI investment, forces organisations to question the real value of new features, signalling a critical test of customer loyalty.

Cyber Security Risk Appetite
The development of risk appetite statements are an important element of an organisation’s risk management strategy.

Thought Leadership – A View on Data Quality
Data Quality is not always about the quality of the data.

Case Studies in AI Ethics
Understanding the impact of AI ethics through real-world examples is essential for building responsible AI systems. Let’s prioritise ethical considerations in AI development.

ISO 27001 Information Security Certification – Is it Right for You?
Many organisations are seeking to implement a comprehensive management system (ISMS) for information/cyber security. Choosing the appropriate frameworks requires careful consideration of an organisation’s objectives, costs and effort involved.

Modern Approach to End-User Computing
In the modern ICT environment, your approach to end-user computing needs to truly allow for anywhere, anytime, and anyhow, in a secure environment that provides your user base access to full functionality regardless of the device.