Cyber Security Series: 'Hackers Gonna Hack' Part 2/3 [APAC]

Logo
Presented by

Ken Mizota, Chief Technology Officer - APAC at Rapid7

About this talk

Foundational Components to Enable a Cyber Target Operating Model In the second webinar of the 'Cyber Security Series', Ken Mizota, Chief Technology Officer - APAC at Rapid7, builds on his Operationalising Cyber Security narrative. Part 1 covered the $150 billion* spent on cyber security in 2021, the core principles of a cyber operating model and the key foundations required to operationalise cyber security successfully. Part 2 focuses on the foundational requirements needed to build a Cyber Target Operating model that delivers a clearly defined strategy and underpins your organisation's cyber mission and vision: - Identifying priority areas to start the cyber target operating model journey - Establishing cyber security KPIs and KRIs - Aligning KPIs and KRIs to core cyber target operating model foundations - Starting the journey to reduce risk and improve ROI without significant investment in budgets or teams - Creating goals and objectives that challenge convention and positively impact the cyber security journey To get the maxim benefit from part 2, watch part 1 to benchmark your existing cyber security maturity against the six foundational components - this assessment will be used in part 2 to map against KPIs and KRIs.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (654)
Subscribers (56537)
Rapid7 is creating a more secure digital future for all by helping organizations strengthen their security programs in the face of accelerating digital transformation. Our portfolio of best-in-class solutions empowers security professionals to manage risk and eliminate threats across the entire threat landscape from apps to the cloud to traditional infrastructure to the dark web. We foster open source communities and cutting-edge research–using these insights to optimize our products and arm the global security community with the latest in attackers methods. Trusted by more than 10,000 customers worldwide, our industry-leading solutions and services help businesses stay ahead of attackers, ahead of the competition, and future-ready for what’s next.