InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat Forecast Vs. Operational Risk: What Keeps You Awake At Night? Part 2

Presented by

Steve Yates FBCI, CBCP, FICPEM, MEPS, Director | Acertia Limited

About this talk

Companies at a senior leadership level recognize operational risk in the form of their “Risk Appetite & Tolerance”, defined as “the amount and type of risk that an organisation is willing to take in order to meet their strategic objectives”. The question companies should ask themselves is how much can cybersecurity risks identified in the 2024 threat forecast impact organizations technology, and how can they communicate effectively what this means to their organizations' strategic objectives? Tune into this session presented by disaster recovery and cyber resilience expert Steve Yates as he brings to light the operational risk considerations and resilience options for those “scary” technology moments which can cause organizations to face the Maximum Tolerable Period of Disruption, or when an organization faces tough decisions, one of which may mean no choice but to close down! By the end of the session, you will be able to: - Be aware of The 2024 threat forecast and potential cybersecurity impacts on technology. - Form an understanding of the difficult language that must be used when dealing with the senior leadership team. - Be conversant with a joined-up thinking approach when reviewing technology operational risk and identifying resilience measures.
Information Security

Information Security

259138 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics