How to Align Profits with Compliance and the Survivability of our Infrastructure

Logo
Presented by

Trish McGill, SME Cyber Security IT/OT, Brian Wagner, Head of Security & Compliance, Tim Clemens, Data Protection Expert

About this talk

Cyber criminals are increasingly targeting vital critical infrastructure systems such as water supply, power grids, telecommunication networks, transportation networks, financial services and healthcare providers in an effort to cause chaos, damage, and disrupt the survivability of a nation and its residents. Our reality today, and even more so in the future, is that the survivability of a nation and its citizens is dependent on its ability to protect its critical infrastructure - and in our digital way of life, a large part of this comes down to the ability to manage and protect our data. Join this special edition of Data Security Talks to hear from European industry leaders Trish McGill, Executive Subject Matter Expert Cyber Security IT/OT, Brian Wagner, Head of Security & Compliance at AWS EMEA, Tim Clemens, Data Protection Expert, and Rubrik’s Field CTO, Pierre-François Guglielmi as they discuss: -> How our survivability is put under crushing pressures due to cyber threats -> The impact of data regulations and compliance efforts on the bottom line -> Managing up and out: What to tell your board, national authorities, and the people when serious incidents hit This is your chance to learn about the forces that are shaping the survivability of our critical infrastructure. Make sure to check out attachments, where we have made our latest insights on ransomware recovery and regulatory compliance available to you for free!
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (110)
Subscribers (13801)
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.