A new era for CISOs – what are their responsibilities and what issues and challenges are at the top of their agendas?
As a result of digital transformation strategies, what are the key security threats that major FIs will face over the next year in addressing employee and consumer digital requirements?
What needs to be done today to prepare your organisation so it can respond to the unprecedented increase in mobile engagement by employees and customers and it’s links to an exponential increase in fraud?
What are the key areas of weakness that can be exploited by cyber crime? Passwords and an ability to compromise have been heavily mentioned in the press recently. Is this a key battleground for organisations as they invest in managing cyber threat?
Data has become one of the world’s most valuable assets – so, unsurprisingly, protecting it from a multitude of risks remains a continual challenge.
Over the last five years, headline-grabbing incidents have demonstrated the potential implications of a data breach – from damaged business reputation, to loss of revenue and even company devaluation. According to the 2018 Cost of a Data Breach survey conducted by the Ponemon Institute, on average data breaches cost a company $3.86m, up 6.4% from 2017.
As the impacts of data breaches increase, so do the opportunities for employees to leak sensitive data – either accidentally or maliciously.
The presenter will be discussing how our recently launched Insider Data Breach survey shows just how prolific insider data breaches are and who is behind them.
In the event of a breach, privacy and security professionals often approach incident response from two different outlooks. Whereas security teams are focused on threat vectors, privacy teams are concerned with personal data leaks and adhering to various global privacy laws. While the two come from different perspectives, it is possible to build an incident and breach response plan that addresses the needs of both teams. In this session, the presenter will discuss how to build a harmonized response plan that addresses both the security team’s technical needs and privacy team’s regulatory requirements across the patchwork of US privacy laws, the GDPR and other global privacy regulations. They will also provide tips to help you map out a 72-hour personal data breach action plan and share practical advice to improve your privacy program.
Learn how to build an incident and breach response plan that fits the needs of security teams and privacy teams
Breakdown what stakeholders, teams, tools and processes should come together in the event of an incident or breach
Understand how to maintain a consistent approach to incident response while complying with privacy regulations across the globe
Regardless of their motives, cybercriminals continue to breach perimeter defences of financial services organisations, usually remaining undetected for months. Increased perimeter security appears to have bred better attackers, more adept at finding ways behind organisational lines. A pragmatic ‘assumed breach’ mentality breeds innovative thinking in cyber security. By turning our attention to finding attackers already on the network, we can reduce the extent and severity of consequential damage and facilitate faster recovery. Deception, an age old discipline in every adversary based discipline, offers cyber teams the means to identify and detect advanced attackers on the network and effect the correct remediations.