“Cybersecurity is a Never-Ending Game of Cat and Mouse”
—Silicon Republic, July 2017
“Cybersecurity: The Cold War On Line”
—Nature.com, July 2017
“Industrial Cybersecurity Explosion”
—Automation World, July 2017
“Cybersecurity Stocks Rally as Global Hackings Start to Impact Corporate Bottom Lines”
—CNBC, July 2017
“Ransomware Attacks Could Disable Canadian Infrastructure Too”
—CBC, July 2017
“Cybersecurity gets more sophisticated—but so does hacking”
—Globe and Mail, June 2017
It seems as if everywhere you look nowadays there is a new cyber-attack or emerging threat—what is your response?
It sometimes seems as if each new day brings another loss of valuable data by a company or government department. As the headlines above indicate, attacks vary from continent wide ransomware to election hacking in the US, to assaults on specific critical infrastructure or commercial enterprises. According to a recent survey, the average cost of a data breach at Canadian companies was $5.78 million.
Put simply, no one is safe. You have a responsibility to ensure you keep up to date with threats and ensure your systems are as secure as possible and your people are aware of the risks and the shape of likely attacks.
No organization can be 100% secure so you need to focus on cyber resilience
Complete security is a myth—no one can defend themselves against every possible attack and with new threats emerging almost daily, it is hard to imagine how you might effectively prepare for every eventuality. This event explores a three-pronged strategy that will optimize your defenses now and in the future, while ensuring you have a practical strategy that you can implement to bounce back in the event of an attack.
A three part strategy for maximum cyber resilience
We’ve broken this event into three parts that each cover different but essential aspects of any resilient cybersecurity strategy:
- Before a breach—How can you best identify and track existing threats and create systems and people that will effectively defend against attack
- After a breach—Do you have contingency plans for business continuity, how to respond to ransom demands, a state of the art strategy for stakeholder communications?
- Future threats and your response—What risks does the future hold and how are you tracking them? What processes do you have in place to prepare?
Together these three components add up to an effective CYBER RESILIENCE strategy – you can’t make yourself invincible but you can put in place a strategy that will minimize risk, disruption and cost in the event of a successful attack. And there will be a successful attack.
A three-part strategy—a comprehensive conference
As we work on the agenda some of the issues we are focusing on are:
- Before a breach
After the breach
- internal Structures
- insider threats
- hiring and training cyber defense professionals
- preparation for different kinds of attacks and actors
- profile of current threat actors - fraud, theft, terrorism, blackmail
- Conducting a cyber threat vulnerability analysis—and acting on it
Future threats and opportunities
- crisis management
- business continuity and recovery
- future threat landscape
- new technologies and vulnerabilities
- preparing your organization to deal with an uncertain future
Meet and learn from established security experts
Find out from experts and peers about how they are defending their organizations from attacks. Learn about the latest strategies and management practices you can use to identify threats and either stop them or minimize their impact.
Building on success.
The Conference Board is Canada’s most respected independent research and conference development organization. Conference Board events attract the top public and private sector leaders, and provide an insightful and enlightening learning experience for conference participants.
We’d like to thank our generous sponsors for their contribution to this event.
The details of this event are subject to change. Please revisit this page periodically for updated information.