Exercising your cyber crisis plans
Facebook X LinkedIn

Exercising your cyber crisis plans

Combined Session
Thursday, November 10, 2022 12:00—13:00
Location: Historic Kassenhalle

Exercising your cyber crisis plans

What are the various types of exercises drills tabletop exercise functional exercise

Why

Provide safe space

Enhance operational resilience

Buys time and mental capacity

When

first takeover after implementation of tools

change in threat level where presentations style sand box / cyber range production systems

HOW

Design

Develop

Conduct

Evaluate

Exercising Your Cyber Crisis Plans
Event Recording
Exercising Your Cyber Crisis Plans
Click here to watch the recording of this session. You'll need to log in to watch it.
Exercising your cyber crisis plans
Presentation deck
Exercising your cyber crisis plans
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Lester Chng
Lester Chng
Bank of Montreal
Lester Chng is a cybersecurity practitioner and his work focuses on running cybersecurity and crisis exercises. He currently runs an exercise program for a large North American Financial...

Panel - Cyber Hygiene Best Practices: Why does it Matter?

Security of users, data, devices and networks is orchestrated via a set of precautionary cyber measures called cyber hygiene. Enterprises today deal wih a sheer volume users, data and devices, often distributed across complex cloud/hybrid environments – making cyber hygiene monitoring a challenging task. In this session, leading cyber experts shed light on the importance of implementing effective cyber hygiene amidst an uncertain threat landscape and share best practices on how to do so.

Warwick Ashford
Warwick Ashford
KuppingerCole
Warwick Ashford is a Senior Analyst who researches cybersecurity and identity-related topics, including emerging technologies and trends. He has been writing IT news and analysis as a journalist...
Boris Beuster
Boris Beuster
E.ON SE
Boris studied economics with a wholesale/resale focus and gained experience as project manager for process optimisation and IT. Since 2011 he has been working on cyber security topics and made it...
Noam Green
Noam Green
Cyolo
Noam Green is VP of Product at Cyolo. He joined the company after holding multiple executive product positions in a variety of cybersecurity companies, including Forescout Technologies and...
Christoph Kumpa
Christoph Kumpa
Axonius
Christoph Kumpa is Regional Director at Axonius. His previous roles include Sales and Consulting responsibilities at HP, Computacenter, and Dimension Data. Kumpa is an Information Security and Data...
Manuel Garat Loureiro
Manuel Garat Loureiro
Booking.com
After being a software developer for 10 years, Manuel realised that his focus on value delivery, product vision and strategic significance was pulling him towards a new and exciting role. As an IAM...

Awareness?! How to make it work in a Low-Tech Environment

Keeping employees engaged with regards to Information Security is a challenge. Even though the industry has plenty of innovative and seemingly fun training programs to offer it seems that the desired effects do not materialize. Information Security is a complex topic that overwhelms especially those colleagues in a low-tech environment – making it fun, easy to understand and more transparent by involving the employees themselves is key.

Awareness?! How to Make It Work in a Low-Tech Environment
Event Recording
Awareness?! How to Make It Work in a Low-Tech Environment
Click here to watch the recording of this session. You'll need to log in to watch it.
Awareness?! How to make it work in a Low-Tech Environment
Presentation deck
Awareness?! How to make it work in a Low-Tech Environment
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Alina Smith
Alina Smith
Aroundtown
After completing an MBA in General Management and gathering experience as a Product Manager of an ERP system, I was given the opportunity to lead all Information Security Governance initiatives of...
Subscribe for updates
Please provide your email address