Newsletter | Volume 1

Issue I
Issue II
Issue III
Issue IV
Issue V
Issue VI
Issue VII
Issue VIII
Issue IX
Issue X
Issue XI
Issue XII
Issue XIII
Issue XIV
Issue XV
Issue XVI
Issue XVII
Issue XVIII
Issue XIX
Issue XX
Issue XXI
Issue XXII
Issue XXIII
Issue XXIV
Issue XXV
Issue XXVI
Issue XXVII

click here to

Subscribe to our newsletter



To Unsubscribe click here

The IT and Cyber Security Challenge

IT and Data must be proportional to the transparency of its governance. Information Security officers feel that they are losing the battle due to continued headlines about the cyber-theft or data breach have made their priorities difficult. The focus of the IT and cyber security day is achieving digital trust so that information and data transition can move safer and faster



There are a number of known and publicly unknown IT and Cybersecurity scandals including the widely publicised Goldman Sachs employee that used confidential regulatory information for the benefit of a client. Other cyber breaches include Target Stores, where 110 million records were compromised, Home Depot, where 56 million payment cards were compromised in 2014, Sony Pictures Entertainment, where the company's inner workings were completely exposed in 2015.

Cybersecurity regulatory guidelines are rather vague
The hackers who breached Ashley Madison's data systems advertised their ethical motivations for doing so, noting both its distaste for the "cheating dirtbags" who used it and Avid Life Media's promises to delete all user profile information for a fee, which it said the hacked data proved was untrue.

The proper corporate response to the Cybersecurity threats is becoming more involved. Contrary to other business areas, the regulatory guidelines are rather vague. For instance, that the board of directors should be informed of risks and handles policies to be in place. However, how do you stay aware and maintain systems in an area, which changes constantly? In an area where you could invest in new knowledge and technology every day to follow the latest developments?

Cybersecurity strategy & activities to avoid potential threats and vulnerabilities
At the seminar/workshop on the 25th, August 2016 will discuss how the IT and cyber threat scenario is developing during these changing circumstances. We will review the different approaches towards planning, prioritisation and manage Cybersecurity activities and ensure that the cyber security strategy sufficient to avoid potential threats and vulnerabilities.

Keynote speeches from IT and Data Security Managers from The National Police Directorate, Cyber Crime Centre, Danske Bank, Velux, Dong Energy, Novo Nordisk, and others will help you and provide guidance to develop an integrated IT & Cyber Security program to help you identify and optimise IT cyber security risks, but also maintain control IT and data compliance violations. http://www.riskability.org/2016/it-security/mailer/index2016.htm