The Processes to Deliver Effective Threat Detection and Response

Logo
Presented by

Steve Yates FBCI, CBCP, FICPEM, MEPS, Director | Acertia Limited

About this talk

Enabling threat detection and response should be a key consideration of managers and the senior leadership team. Specifically supporting threat detection and response processes needed to deliver an effective solution are imminent as organizations continue to face new and challenging operational risks. So what does this mean for any organization believing they are ready, or not? And how do they ensure that their threat vulnerability and risk assessment (TVRA) is proportionate for the changing cybersecurity environment, while taking into account changes to operational efficiency and delivery of products and services to customers? Tune into this session presented by business continuity, disaster recovery, cyber resilience and major incident expert Steve Yates, as he discusses enabling threat detection and response for risks facing complex technology ecosystems. Yates will explore current threats and vulnerabilities and the need for a robust risk management process. In addition, he will delve into real technology major incidents, and explore where compliance is a key component of the end solution. Viewers are encouraged to share, in confidence, their major concerns before the presentation if they wish to gain the most from this session. By the end of the session, you will be able to: - Be aware of the range of threats and vulnerabilities that you may encounter. - Form an understanding of a risk assessment framework for supporting cyber resilience. - Understand how an integrated technology framework can prevent significant disruptions. About the speaker Steve is a Founding Fellow of the Business Continuity Institute (FBCI), as well as being a Disaster Recovery Institute (DRI) International Certified Business Continuity Professional (CBCP) and Cyber Resilience Professional (CCRP).
Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (638)
Subscribers (200189)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.