WoC Cloud Security Cover.png

Download our Crowd Sourced Cloud Security Checklists and Mind Map

  • ** GDPR ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data. 
  • This Crowd Sourced PDF contains the following
    • Checklists including Physical Security, Governance & Compliance, People, Technical, Test and Audit, Incident Response and Availability
    • Ten Questions A Business Must Ask Before Embracing the Cloud
    • Cloud Security Mind Map
  • Over 30 CISOs and executives contributed to this document. They were from organisations  including Aviva, AXA, British Medical Journal, Canon Europe, Catalyst Housing, Digital Law UK, Department Work & Pensions, Ford, Mundy Pharma, Pearson, OCS Group, Pinsent Masons, Transferwise and Unipart.
  • Quick reminder - drop events@cm-alliance.com a note if you want be invited to the Wisdom of Crowds events. 

enter your details below to get your copy:

Black logo with strap.png

We are industry experienced practitioners when it comes to cyber security training & cyber security consultancy services

Cyber Security Training

Training

We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop

Virtual CISO DPO

Virtual CISO and DPO

Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations

Cyber Security Events

Events

We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.

ISO27001

Cyber Essentials & ISO27001

Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements

GDPR GAP Assessment

Third Party Assessments

With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.

Cyber Security GAP Assessment

Security Gap Assessments

We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response

GDPR & How we use your data:

  • The form above collects personal information so we may email you the requested information and pressing the "Get your free copy now"  button acts as informed consent for this processing purpose. Consequently we may be in touch to:

    • Update you when we host our ground-breaking Wisdom of Crowds events in your country or region.
    • Keep you posted on free resources and documents around Wisdom of Crowds events and its outputs. (For example, we tend to create insightful mind maps and we also are the creators of free to view Insights with Cyber Leaders Video Interviews. )
    • Ping you a note about upcoming FREE educational webinars on GDPR and Cybersecurity. 
  • Using the information from this page we will NOT sell or market to you any of our consultancy, trusted advisory services or our GCQH Certified Cyber Incident Planning & Response and other training.  
  • In its purest interpretation, this act of us communicating with you is direct marketing and is processed on the basis of our legitimate interest and your engaging in our services. All marketing communication will include an unsubscribe button or other method of ending communication.

Download the Cloud Security Checklists & Mind Map

A crowd sourced GDPR resource to help you achieve compliance.