Skip to the content

Join us for a live delivery of security features within Microsoft 365.

Local government organisations and councils are responsible for highly sensitive personal data. Often victims of ransomware, councils are also one of the biggest targets for cyber criminals trying to obtain information to sell on the black market. The extend of these attacks affects citizens and their data.

A recent report by the Ministry of Housing, Communities and Local Government’s Local Digital Collaboration Unit Cyber Team shows that UK councils are spending millions on recovery from cyber breaches.

IT Budget constraint, lack of central governance and guidance, and a cyber skills gap are among the key reasons, local government organisations struggle.

During the session Dan Cooper, Cloud and Security Consultant, will show you how to keep all users secure, data protected and operations compliant in Local Government organisations with M365.

The demo will help you make the most of the intelligent built-in Microsoft security features which are often not used to their full potential.

During the webinar: 

  • Implement best security practices on a Microsoft 365 tenancy 
  • Configure Advanced Threat Protection 
  • Set up Conditional Access and Mobile Device Management 
  • Enable Multifactor Authentication 

Watch Now

Paul Gibbons, Cloud Services Manager

Paul Gibbons, Clous Services Manager at Chess, has broad knowledge of legacy and emerging technologies, including Cloud Services, Software, Hardware and Networking. With over 30 years in the IT industry, Paul understands our customers’ challenges and is a key developer of many of the solutions and services Chess offers.

Dan Cooper, Cloud and Security Consultant

Dan Cooper, Cloud and Security Consultant at Chess, boasts more than 10 years of experience in the IT industry. He consults our largest customers from both the public and private sector. Able to work within highly regulated industries, he has experience in working towards and within ISO 27001 and PCI DSS environments, achieving high levels of compliance and security.

Security resources you may find interesting

The Building Blocks of Security and Compliance in Local Government

The Building Blocks of Security and Compliance in Local Government

Based on years of experience in cybersecurity, ethical hacking and cloud applications, our team of penetration testers and technical architects created a short best practice guide. 

Five Significant Savings with Synchronised Security

Five Significant Savings with Synchronised Security

With Sophos' decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can save you money.

Is your cloud harbouring a storm?

Is your cloud harbouring a storm? Part 1

Session one is a live hack demo during which our Pen Tester attacks an organisation's Microsoft 365 tenancy and breaks into a low-level account. Our team show how much data can be breached and exposed by compromising a single account, causing financial and reputation damage.