InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threat-Based Security Risk Management – A Zero Trust Evolution

Presented by

Peter Crumpton, Information Security Manager | NFU Mutual

About this talk

In an increasingly complex and fast-moving security threat, controls and risk landscape, it's easy to get lost in data, tools, and competing priorities. This session explores how to build risk management techniques that serve your organisation. There are many ways to judge risk, and many views on security threats and vulnerabilities. We talk about Zero Trust approaches, but can you truly justify why and what is needed and the impact it will have on reducing the risk? There is a need to model and understand what threats are most relevant to your organisation, and how they could exploit your environments to gain their desired outcomes e.g. criminal gangs looking to sell data or ransom you. This session demonstrates modelling aligned to real threat intelligence and testing outcomes, and how this equates to defined business risk. Key Takeaways: - Storytelling for Impact – How to communicate Zero Trust risk insights effectively to senior management. - Reshaping with Fundamentals – Using core principles to drive meaningful organisational change towards Zero Trust. - Cutting Through the Noise – Transforming overwhelming data into actionable, realistic models. - Truth in Tools – Ensuring risk frameworks reflect reality, not just theory.
Information Security

Information Security

259137 subscribers732 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics