Interested in being a part of our next event? Send us an e-mail and be automatically notified when more information on our next conference is available. We look forward to hearing from you!
Each day brings a new security breach or loss of valuable data by a company or government department. As the headlines indicate, attacks vary from continent wide ransomware to election hacking in the U.S., to assaults on specific critical infrastructure or commercial enterprises. With so many threats at play, now is the time to ask yourself—is your organization prepared?
Since no organization is 100% secure, the focus has shifted from cyber security to cyber resilience. Complete security is a myth—no one can defend themselves against every possible attack. This event identified a three-part strategy for maximum cyber resilience. The three parts covered different but essential aspects of any resilient cyber security strategy:
- Before a breach—How to best identify and track existing threats and create systems and people that will effectively defend against attack.
- After a breach—A contingency plan for business continuity, how to respond to ransom demands, and a state of the art strategy for stakeholder communications.
- Future threats and your response—The risks that the future holds and how to track them, and the processes in place to prepare.
We’d like to thank our generous sponsors for their contribution to this event.