Article et publication

Turnkey, nos retours experts et nos succès ont été couverts par la presse :

InformationAge

How to prepare now for UK SOX - we talk to Information Age

Juillet 13, 2021

cw_logo

Security Think Tank: The security implications of the ‘return to the office'

Juillet 08, 2021

Raconteur-Logo

Covid-19 and employee fraud - comment in Raconteur / The Times

Juin 21, 2021

cw_logo

Security Think Tank: To secure printers think process, technology and people

Juin 11, 2021

cw_logo

Security Think Tank: Vaccine passports cannot be taken lightly

Avril 14, 2021

Consulting US logo

Announcement: Turnkey and LegionStar joint venture

Mars 18, 2021

cw_logo

Security Think Tank: Take a realistic perspective on CNI cyber attacks

Mars 17, 2021

logo_sig

Turnkey Consulting highlights SME sector’s key role in tackling climate change

Mars 15, 2021

GRC world forum

Bridging the gap between business goals and security requirements

Février 15, 2021

cw_logo

Security Think Tank: Renewed US stability may ease cyber tensions

Février 15, 2021

IT Pro

What are employers' responsibilities when we use personal tech to work from home?

Janvier 25, 2021

cw_logo-October

Security Think Tank: Cyber effectiveness, efficiency key in 2021

Janvier 05, 2021

Computing logo

Security Excellence Awards - Richard Hunt interview

Décembre 12, 2020

it-security-guru-logo

Why a fear of cyber threats is not paranoia

Décembre 09, 2020

cw_logo-October

Security Think Tank: SIEM and SOAR are far from mutually exclusive

Décembre 02, 2020

GBAF-logo

Bots Are People Too: Robotic Process Automation in Finance

Décembre 01, 2020

Computing logo

Turnkey shortlisted for Risk Management and Security Innovation of the Year at the Security Excellence Awards 2020

Novembre 02, 2020

cw_logo-October

Security Think Tank: Safeguarding PII in the current threat landscape

October 19, 2020

cw_logo-July

Security Think Tank: No secret sauce for edge security, just good practice

September 15, 2020

UK Authority

South Central Ambulance Service to automate business processes

September 10, 2020

eGyidzUP

Cybersecurity in the COVID era: Guarding against phishing

September 3, 2020

E3 Magazine-July

Putting Out Fires: Ensuring Privileged Access Management With SAP Firefighter

August 10, 2020

cw_logo-July

Security Think Tank: Ignore AI overheads at your peril

July 13, 2020

E3 Magazine-July

Turnkey Consulting Brings Cybersecurity Expertise To France

July 1, 2020

cw_logo-June

Security Think Tank: Securing containers needn’t be taxing

June 24, 2020

cw_logo-May

Security Think Tank: Burnt out CISOs are a huge cyber risk

May 13, 2020

cw_logo-RH IV

SAP S/4 Hana projects seem set to repeat security missteps

May 4, 2020

cw_logo-Apr

Security Think Tank: Continuity planning doesn’t have to be complex

April 3, 2020

Dark Reading logo

Security Not a Priority for SAP Projects, Users Report

March 26, 2020

PrivSec report

PrivSec Report: #Privacy: 69% of SAP users believe SAP projects do not prioritise IT security

March 26, 2020

SCMediaUK

The feral app threat: Lack of visibility worsens threat for enterprises

February 27, 2020

cw_logo-Feb20

Security Think Tank: Ask yourself if zero trust is right for you

February 17, 2020

cw_logo-Jan2020

Security Think Tank: Let’s call time on inciting fear among users

January 6, 2020

prolific_london_logo

Turnkey Consulting appoints former PwC partner as first Chairman

December 11, 2019

cw_logo-Nov

Security Think Tank: Risk-based response critical to protect data

December 11, 2019

cw_logo-Nov

Security Think Tank: The cloud needs security by design

November 5, 2019

cw_logo-Nov extra

Making the case for integrated risk management

November 4, 2019

cw_logo-Oct-RH

Security Think Tank: Risk management must go beyond spreadsheets

October 15, 2019

cw_logo-Oct-SP

Security Think Tank: The operational approach to integrated risk management

October 9, 2019

E3 Magazine-GRC to IRM

How SAP GRC Can Accelerate Integrated Risk Management

October 9, 2019

E3-Avoiding Security Remediation In S/4 Hana Projects

Avoiding Security Remediation In S/4 Hana Projects

September 25, 2019

cw_logo-Sept

Security Think Tank: The case for blockchain-based identity

September 10, 2019

E3 Magazine

SAP Access Management: Beyond The Application Layer

August 27, 2019

cw_logo-Aug19

Security Think Tank: Balancing data accessibility with security controls

August 12, 2019

cw_logo-July 19

Security Think Tank: Don’t dismiss the business benefits of GDPR

July 12, 2019

E3 Magazine

Security Risks of Increased Mobility With S/4 Hana

June 19, 2019

cw_logo-June19

Security Think Tank: Frame cyber security impacts in business contexts

June 11, 2019

cw_logo-May19

Security Think Tank: In-app segregation more intelligent and permissive

May 21, 2019

E3 Magazine-S/4 HANA

What Systems Integrators Don’t Explain About S/4 Hana

May 7, 2019

isbuzz-news-logo

Wipro breach: a call for ever-rigorous cyber security protection say Richard Hunt, managing director at Turnkey Consulting

April 17, 2019

cw_logo-Apr19

Security Think Tank: Seven steps to manage risk of catastrophic cyber attack

April 16, 2019

cw_logo-Mar19

Security Think Tank: No one key risk indicator is generic across all businesses

March 12, 2019

cw_logo-Feb19

Security Think Tank: Know strengths and weaknesses of UTM systems

February 11, 2019

ID Bulletin logo

ID Bulletin Expert Panel: Can MFA work long term if customers prefer convenience over security?

January 25, 2019

Director logo

Director Magazine Case Study: how I set up in Australia

January 17, 2019

cw_logo-Jan

Security Think Tank: Use SDN, containerisation and encryption tools to boost security

January 7, 2019

cw_logo-31 Dec

Security Think Tank: Pay attention to attribute-based system access permissions

December 31, 2018

cw_logo

Security Think Tank: Prevention and detection key to disrupting malware comms

December 13, 2018

cw_logo

Security Think Tank: Deploy multiple defence layers to protect data-rich applications

November 2, 2018

E3 Magazine

Are You Able To Detect Your (Cloud) Access Threats?

October 29, 2019

E3 Magazine

SAP Identity Management: Automated access reduces risk

October 15, 2018

cw_logo

Security Think Tank: Shift to outcomes-based security based by focusing on business needs

October 4, 2018

cw_logo

Security Think Tank: Adopt a proactive approach to software vulnerabilities

September 13, 2018

cw_logo

Security Think Tank: Outsource Security Operations, Not Control

August 15, 2018

cw_logo

Security Think Tank: How To Create Good Passwords And Add Security Layers

July 06, 2018

cw_logo

Security Think Tank: Understand Data For Risk-Based Protection

June 01, 2018

cw_logo

Security Think Tank: Reducing Cyber Attacker Dwell Time Is Critical

May 01, 2018

image-1

GDPR Report: The Role Of The Board In Sustainable GDPR Compliance

April 25, 2018

cw_logo

Security Think Thank: Use Good Practice To Address Cryptojacking Risk

April 24, 2018

cw_logo

Security Think Thank: Multi-Layered Security Key To Fileless Malware Defence

March 13, 2018

verdict_encrypt-362453-edited

What CyberSecurity Risks Are Companies Currently Underestimating Most?

March 8, 2018

E-3_logo-300x86

SAP Skills: Why Contractor Hire Is Not The Only Option

February 1, 2018

cw_logo

Security Think Thank: Don't Automatically Automate Security

January 31, 2018

E-3_logo-300x86

UKISUG Connect: GDPR, Business Transformation And Robot Risk

December 5, 2017

E-3_logo-300x86

Turnkey's Celebration of 10 Years in Australia, Features In 'e-3 Magazine International'

November 21, 2017

ISAP_Logo220x90

Turnkey's Expansion To New Zealand Features In 'Insidesap' Magazine

November 21, 2017

cw_logo

Security Think Tank: Web Security Down To Good Risk Management

November 8, 2017

cw_logo

Security Think Tank: Security Analytics May Not Be For Everyone

October 5, 2017

cw_logo

Security Think Tank: Six Ways To Boost Cyber Resilience

September 20, 2017

cw_logo

Security Think Tank: Five Security Controls To Keep Employees Out Of Cyber Firing Line

Aug 9, 2017

Defence%20Digital

Cyber Security & The Sap Estate: Practical Steps For Every Organisation

May 10, 2017

cw_logo

Security Think Tank: How To Maximise The Value Of Red Team Excercises

Apr 30, 2017

cw_logo

Tips On How To Get a Hana Implementation Off The Ground

Apr 25, 2017

logo-NatWest

Turning Disaster Into Opportunity

Apr 21, 2017

logo-ScienceDirect

The Uk's £1.9bn Cyber-Security Spend – Getting The Priorities Right (Please Note, Full Article Is Paid-For Content)

Mar 30, 2017

cw_logo

Security Think Tank: Four Guidelines On How Balance Security, Usability And Cost

Mar 29, 2017

cw_logo

Security Think Tank: Data Custodians Likely To Be Top Targets Of Integrity Attacks

Feb 20, 2017

cbrlogo

How a Cloud-Based Philosophy Makes Traditional Consultancy Services Easier To Purchase

Jan 18, 2017

cw_logo

Security Think Tank: Add Risk Of Dns Attack To Business Continuity Plan

jan 16, 2017

cw_logo

How Information Security Professionals Can Help Business Understand Cyber Risk

Jan 10, 2017

idglogo

What Will Be The Single Biggest Security Threat Of 2017?

Jan 5, 2017

cw_logo

Security Think Tank: Cyber Insurance – How To Make Cyber Risk Easier For Business To Understand

Dec 7, 2016

cw_logo

Security Think Tank: Cyber Insurance – Factor In All Costs And Obligations

Oct 10, 2016

cw_logo

Security Think Tank: Phishing: Protect, Educate And Limit Damage

Oct 10, 2016

ITProPortal

Enterprise Risk Management: 'Management-Speak' Or Critical Business Tool?

Sep 14, 2016

cw_logo

Security Think Tank: Addressing The Malware Arms Race

Sep 2, 2016

cw_logo

Security Think Tank: Brexit And Infosec - For Now It's Business As Usual

Aug 3, 2016

sc-magazine

Bugs In Sap Hana Allowed Remote Code Execution

July 25, 2016

cw_logo

Security Think Tank: Biometrics Have Key Role In Multi-Factor Security

July 09, 2016

cw_logo

Security Think Tank: How Info Sec Pros Should Influence Prep For GDPR

june 09, 2016

gc-header-logo_1

GRC Is The Facilitator

March 29, 2016

Info_Security

How To 'Protect The Data Inside The Data Center'

February 23, 2015

computing_software_logo

Getting GRC Right - Turnkey Consulting Talks To Computing Security Magazine

December 07, 2015

logo

Turning Data Privacy Controls Projects Into Business Benefit

November 30, 2015

Forrester-Logo.svg

Forrester Research Report: Defining Data Protection

February 26, 2015

techweeklogo

What Should Chief Security Officers Ask Santa For This Christmas?

December 19, 2015

m

Turnkey Consulting Achieves Sap Recognized Expertise Status For GRC

March 3, 2015

1

Turnkey Consulting Shares Expertise At Sap GRC 2015

December 6, 2015

1

Presentations And New Product At Sap Insider Singapore Conference

August 28, 2015

news-item

Turnkey Consulting Opens Office In Singapore

January 8, 2015

More

Avez-vous besoin d’aide ?

Chez Turnkey, nous n’avons pas de réponse pré-faite. Nous aidons nos clients à répondre à leurs propres défis en matière de GRC. Mettez-nous au défi et voyons si nous pouvons vous aider à aller encore plus loin.

Contactez-nous