Keeping Pace with Cyber Security by Scaling IT Governance & Data Risk Management

Presented by

Jorge Ferrer Raventos - Solutions Engineering Specialist, OneTrust

About this talk

The post-digital transformation reality has exposed businesses differently across newly adopted IoT eco-systems and expanding regulations targeting cyber negligence. Exposure has been realised as incidents have increased in frequency, cost, and complexity. From business engagement to technology risk oversight, an integrated strategy is essential to reinforcing and measuring your InfoSec risk program. In this session, Jorge highlights some of the latest market insights from InfoSec leaders, peers, and industry analysts, examining the driving factors behind business challenges in managing risk. He also discusses how scaling your approach to managing IT and data assets, risks, controls and policies can deliver a more complete picture to better measure and inform program investments. Key takeaways: - how to evaluate your current IT-ecosystem and centralise key data points to enhance visibility to risk across critical areas of the business - enhance risk response by aligning with the business to transition from low to high trust risk and security culture - identify areas for efficiency gains to focus on strategic program investment. Protect your data and defend against cybercriminals. Download your FREE ISF cyber security awareness month resource kit today -

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (137)
Subscribers (21290)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user