The IT Pro Podcast: Cyber security post-Brexit

Changes are on the way - but how will they affect IT security?

Unsurprisingly, the issue of Brexit has been somewhat pushed out of the public consciousness by the ongoing coronavirus crisis - but that doesn’t mean it’s gone away. In less than four months, the transition period will end, and on 31 December, Britain will officially leave the EU. This will have wide-reaching implications in a number of areas, but there are still significant questions to be answered around how it will affect the IT security of UK companies.

Issues like the availability of security talent, the integrity of supply chains, intelligence-sharing and more are all going to be impacted when the transition period ends. But what changes can businesses expect to see, and what can they do to prepare themselves for them? In this episode, Adam is joined once again by special guest co-host Keumars Afifi-Sabet to discuss.

Footnotes

Subscribe

Featured Resources

How to scale your organisation in the cloud

How to overcome common scaling challenges and choose the right scalable cloud service

Download now

The people factor: A critical ingredient for intelligent communications

How to improve communication within your business

Download now

Future of video conferencing

Optimising video conferencing features to achieve business goals

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Recommended

The IT Pro Podcast: There’s no such thing as obsolete tech
Technology

The IT Pro Podcast: There’s no such thing as obsolete tech

26 Feb 2021
The IT Pro Podcast: Turning developers into craftspeople
Development

The IT Pro Podcast: Turning developers into craftspeople

19 Feb 2021
The IT Pro Podcast: Navigating Brexit data transfers
data protection

The IT Pro Podcast: Navigating Brexit data transfers

5 Feb 2021
The IT Pro Podcast: Technology in healthcare
chief technical officer (CTO)

The IT Pro Podcast: Technology in healthcare

29 Jan 2021

Most Popular

How to connect one, two or more monitors to your laptop
Laptops

How to connect one, two or more monitors to your laptop

25 Feb 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

26 Feb 2021
Ransomware operators are exploiting VMware ESXi flaws
ransomware

Ransomware operators are exploiting VMware ESXi flaws

1 Mar 2021