7
#BetterDirectors #WebinarWednesdays #BB@9

#BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Page 2: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Supply chain risk: Geographic location

People risk: People Centric Systems Integration

Brand/Reputation risk: Social media & Customer engagement

What to consider in pursuit of Opportunities

Page 3: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Cellphone Caller ID spoofing

Protective measures

Page 4: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

3. Do we have an incident response plan for

addressing the loss of our own or customers

intellectual property?

What to consider in managing cyber

Threat exposure

1. How is personal information about our

employees, customers and suppliers treated and

secured?

2. Are we managing third party access to our

business systems and information?

Page 5: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Password reuse vulnerability

Password reuse Vulnerability

Page 6: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Q&A Session

Page 7: #BetterDirectors #WebinarWednesdays #BB@9 · 2020. 5. 21. · #BetterDirectors #WebinarWednesdays #BB@9 Thank you for joining us for today's webinar. Contact Michelle Govender via

#BetterDirectors#WebinarWednesdays#BB@9

Thank you for joining us for today's webinar.

Contact Michelle Govender via email: [email protected]

Website: https://cybersecleaders.co.za/

Please complete the IoDSA Event Satisfaction Survey at the end of this webinar or from the QR code here: