4
www.cyberriskinternational.com EXECUTIVE CYBER THREAT BRIEFINGS LESSONS FROM THE FRONTLINES BUSINESS TRAINING “The CRI Executive Briefing Masterclass on cyber risk was particularly useful to me as a risk professional. It provided enough technical knowledge to understand the scale and nature of the issue and more importantly proposed a risk framework to enable status and progress, in this difficult area, to be understood by all levels of the organisation.” Roger K Long – Head of Operational Risk AIB – Allied Irish Bank

CRI-Exec-Cyber-Briefings (1)

Embed Size (px)

Citation preview

www.cyberriskinternational.com

EXECUTIVE CYBER THREAT BRIEFINGS LESSONS FROM THE FRONTLINES

BUSINESS

TRAINING

“The CRI Executive Briefing Masterclass on cyber risk was particularly useful to me as a risk professional. It provided enough technical knowledge to understand the scale and nature of the issue and more importantly proposed a risk framework to enable status and progress, in this difficult area, to be understood by all levels of the organisation.”Roger K Long – Head of Operational Risk AIB – Allied Irish Bank

Cyber risk management is more than just a strategic imperative. It’s a fundamental part of doing business.

For many C-level executives and board members the concept of “cyber security” is vague and complex. It may be on your agenda but what does that actually mean? What can your organisation do?

The reality is cyber threats affect every business sector, size and jurisdiction. Every organisation has data assets of value and the fact is most cyber attacks are indiscriminate and use automated tools and techniques to expose known vulnerabilities.

“The biggest cyber vulnerability is human awareness, lack of leadership and execution.”Paul C Dwyer – President of the ICTTF International Cyber Threat Task Force.

Cyber resilience starts with awareness at C-Level, you need to recognise at some time your organisation will be attacked.

Further more you need to understand:> What are the biggest threats?> Which assets are at greatest risk?> Who would target you?> What are they after?> What are the likely scenarios?

The bottom line is there is no such thing as 100% secure. Cyber security is as much about governance, risk management, legal and compliance as it is about IT security operations. A balanced cyber defense strategy involves integrating cyber risk management into normal risk management operations. You need to understand your exposure and your cyber risk appetite.

Your potential risks include:

Tangible Costs> Loss of funds> Damage to Systems> Regulatory Fines> Legal Damages> Financial Compensation

Intangible Costs> Loss of competitive advantage (Stolen IP)> Loss of customer and/or partner trust> Loss of integrity (compromised digital assets)> Damage to reputation and brand

“Thus, what enables the wise sovereign and the great general to strike and conquer, and achieve things beyond the reach of ordinary men; is foreknowledge.”Sun Tzu, Military Strategist 500BC.

Introduction

www.cyberriskinternational.com

Cyber Security

Risk Management

Cyber Risk Management

Effective cyber risk management (Quantitative and Qualitative) is a balanced approach of processes that cover prevention, detection and response.

This executive briefing is delivered by “real world front line cyber warriors” that understand business and risk management.

It will help you to understand the most important cyber threats.

During the briefing we highlight the top threats for seven key industry sectors based on real life case studies:> Retail> Manufacturing> E-commerce and Online Payments> Online Media> High Technology> Telecommunications> Insurance

Our cyber security experts will offer real world stories and practical insights to help your organisation begin to assess its threat profile and stay a step ahead of cyber malefactors.

CRI recognises the importance of knowledge transfer in the fight against the cyber “bad guys”. We have developed these briefings specifically for the C-suite and board members. All of the material is delivered by seasoned cyber security experts in a low tech fashion.

Due to the nature and content of these briefings attendance is by invite only.

Chatham House Rules Apply.

Topics covered include:> Cyber Risk Management a Business Imperative> Cyber Security Risk Defined> How to Manage Cyber Risk> Building a Cyber Security Strategy> Implementing a Cyber Security Strategy> Aligning with Regulatory Requirements> Managing Change Related to Cyber Security> Cyber People – The Right People and Structure> Cyber Metrics – Measuring Your Cyber Risk> Cyber Intelligence> It’s happened – Your hacked – What to Do!> Cyber and the Boardroom – How to Interact

Format and Case Studies The Briefings

www.cyberriskinternational.com

Lead Advisor Profile

Paul C Dwyer is an internationally recognised information security expert with over two decades experience and serves as President of ICTTF International Cyber Threat Task Force and Co Chairman of the UK NCA National Crime Agency Industry Group.

A certified industry professional by the International Information Systems Security Certification Consortium (ISC2) and the Information System Audit and Control Associataion (ISACA) and selected for the IT Governance Expert Panel.

Paul is a world leading Cyber Security GRC authority. He has been an advisor to Fortune 500 companies including law enforcement agencies, military (NATO) and recently advised DEFCOM UK at Westminster Parliament.

He has worked and trained with organisations such as the US Secret Service, Scotland Yard, FBI, National Counter Terrorism Security Office (MI5), is approved by the National Crime Facility and is a member of the High Tech Crime Network (HTCN).

Find Out More

Bronagh LyonsT: +353-(0)1 9053260E: [email protected]

Get in Touch

Cyber Risk International LtdBroadmeadow HallApplewood CloseApplewood VillageSwordsCo DublinIreland

+353 (0)1 905 [email protected]

Cyber Risk International Ltd4th Floor 86-90 Paul Street London EC2A 4NEUK

+44 (0)20 3286 [email protected]

www.cyberriskinternational.com