The Economist Research: Cyber Attack Response – Are business leaders ready?

Presented by

James Chambers, Senior Editor, The Economist Intelligence Unit & Arabella Hallawell, VP Strategic Planning, Arbor Networks

About this talk

New research from The Economist Intelligence Unit shows how businesses are starting to view cyber-attacks as inevitable – and also as a potential opportunity. The report, sponsored by Arbor Networks, entitled “Cyber incident response: Are business leaders ready?” shows that despite 77 percent of companies suffering an incident in the past two years, over a third of firms (38 percent) still have no incident response plan in place. In fact, only 17 percent of businesses globally are fully prepared for an online security incident. Despite this, the majority (67%) of senior executives believe cyber incidents can be an opportunity to enhance their company’s reputation, provided the response is competently handled. Attend this webinar to learn: • Why the level of preparedness is being held back by lack of understanding about threats • How an emphasis on reputation is driving formalization of plans and processes • The reasons firms remain reticent about disclosing incidents and sharing intelligence about threats

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (1148)
Subscribers (13229)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more