Risk Based Security: Managing through the minefield

Presented by

Steve Durbin, Managing Director, ISF Ltd

About this talk

As cyber security risks increase in sophistication and number, organisations need to switch from responding to incidents to identifying them and how best to prevent them from occurring in the first place. Developing a robust risk based approach to security needs to focus on supporting organisations to prioritise threats and understand the techniques that may be employed as part of the attack. Without this knowledge an organisation would struggle to determine the level of exposure to such threats and if cyber incident response plans are structured and primed to address such threats when the attack occurs. During this webinar, Steve Durbin, Managing Director of ISF, will discuss the need for a risk based approach to security and why it is an essential component to today’s business.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (657)
Subscribers (13398)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more