EVENT OVERVIEW

CYBERSECURITY RISKS OF WORKING REMOTELY

The rise of Coronavirus has caused many organizations worldwide to transition their employees to work from home. While necessary to protect employees’ wellbeing in the time of a health crisis, remote work also facilitates cybersecurity threats that must not be ignored. Employees that are working from home need to be educated on the most important steps to take to avoid having their corporate devices or data compromised, especially when their organization has not had the time or resources to implement a strong set of remote work policies, technology, and training, which is the case for many organizations today caught off guard by the worldwide pandemic.

AGENDA

14:00 - Welcome Remarks & Introduction

Arrival of attendees via Smart Webinars

14:10 - 14:25 - Session 1 - Delegate Presentation

RACE - RISK - AWARE CULTURE AND EMPOWERMENT

RACE approach aims to inspire you how we dealt with risk management in a refreshing way. This will lead you to get a grip on knowing the real risks and lead you through the maze of security and continuity, addressing the relevant risks and reaching an optimum at any given moment in time, being able to rapidly adapt to new situations and connect doing business with security. The focus is on doing business in a controlled way.

Use our approach and concepts to think differently, to be more successful, and be in control. Our approach is based on more than twenty years of experience, and trial and error. It’s not just a method on paper, but a real proven approach that works.

This way of thinking opened the possibility to provide mobile devices fit for use and proved to our management that the risks were manageable.’ Edwin Delwel. Chief Commissioner and Head of Mobile Solutions Dutch Police Force

Speakers:

• Ardie Kleijn, CISO at Dutch National Police

• Anne Miek Wauters, Deputy CISO at Dutch National Police


Ardie Kleijn and Anne Miek Wauters are the authors of the book RACE. Risk-Aware Culture and Empowerment. They aim to share the practical approach that adds a new dimension to how we look at information security, especially in involving management.’ Inge Philips-Bryan. Public Policy Leader, Partner Cyber Risk Services, Deloitte Netherlands. The book is available to purchase at the event.

14:30 - 14:45 - Session 2 - Partner Presentation

RANSOMWARE ATTACKS AND INCIDENT RESPONSES

In information security, we have heard “the perimeter is dead” for years. That theory is being tested now that more people are working remotely than ever.

In recent weeks, the number of stories of ransomware attacks and other types of cybercrime has increased as the new reality is exploited by criminals. It shows us that the IT perimeter definitely exists. The real test now is to ensure business continuity while protecting the business outside the perimeter. Listen in for insights from Sam Curry on how to secure the remote workforce and gain actionable steps to apply immediately.

Speaker:

  • Sam Curry, CSO at Cybereason
14:45 -15:15 - Session 3 - Open Discussions and Q&A

CYBERSECURITY RISKS OF WORKING REMOTELY

The rise of Coronavirus has caused many organizations worldwide to transition their employees to work from home. While necessary to protect employees’ wellbeing in the time of a health crisis, remote work also facilitates cybersecurity threats that must not be ignored. Employees that are working from home need to be educated on the most important steps to take to avoid having their corporate devices or data compromised, especially when their organization has not had the time or resources to implement a strong set of remote work policies, technology, and training, which is the case for many organizations today caught off guard by the worldwide pandemic.

Panel Questions:

  • What are the core risks of working from home?
  • What have you seen happen in your environment?
  • What do you expect in phase 3?
  • Do you have changes in true positives and/or in false positives?
  • Are you having a new dialog with the business?
  • Have you done any tabletoping?
  • What technologies are central to your flexibility and continued operations?
    a. IT in general
    b. Security specifically
  • Is senior management attuned to the adaptive nature of risks and threat and are you talking regularly?
Register Now