Defensible Cybersecurity: Balancing Business and Operational Requirements

Logo
Presented by

John Lee, Managing Director of GRF Asia-Pacific Pte Ltd

About this talk

As countries and organizations struggle with the global pandemic in 2020 and its aftermath, the adoption of digital and emerging technologies will accelerate due to the need for businesses to adapt and adjust to the new norm. Digital technologies have already start to transform industries. They offer improved solutions that changes our lives in how we do our work and live. The wheels of digital transformation were set in motion in the mid-2000s when the mobile and internet of things were gathering widespread adoption. With the advent of emerging technology amidst Industry 4.0 (and 5.0), it poses certain cybersecurity challenges as security may not be designed or planned in the new technology development and implementation. The quickened pace of technology adoption and digital transformation will open gaps in the organizations’ digital fabric that can lead to data breaches either intentional or unintentional. Just as digitalization brings opportunities for productivity gains and innovation in products and service offerings, it also exposes the organization to increased cyber threats. The online world that we live in has increased the risks for organizations as our data may be exposed to a breach because of the increased attack surface. Organizations needs to take steps to create a defensible cyber infrastructure in their digital transformation journey. The talk will cover the steps that organizations need to take to ensure that cybersecurity is weaved into the organizations’ DNA. Some best practices will be discussed as well as examples on how they can be implemented. The talk will end with some key take-aways to build a defensible cyber organization and security program.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198882)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.