Even the most well-regarded and robust security systems sometimes have a threat slip through the cracks and make a big impact. This can often happen at a weak point that was considered non-critical or in an area that was simply overlooked. Companies need to be prepared if their employees click on the wrong link and download some malware where they can face a ransomware situation.


14:00 - Welcome Remarks & Introduction

Arrival of attendees via Smart Webinars

14:10 - 14:25 - Session 1 - Delegate Presentation


There are a variety of risks inherent to the modern IT landscape. The increased use of digital data requires a determination of what information assets, networks, and systems are critical to the business. Increased sophistication from malicious third parties requires rigorous security protocols that keep systems and software up-to-date. Increased reliance on vendors for data collection, transfer, and storage requires controls in place to protect information. Businesses must include risk management within their overall strategic vision to ensure business continuity and effective incident response so that if systems do go down they can be brought back online quickly.

Learning Outcomes:

  • How to identify the primary risk management needs within your organization
  • Strategies to manage the impact posed by the risk of security breaches
  • How to establish internal controls over system and network access to manage the risk of internal threats


  • Barry Cook, Global Data Privacy Officer at VFS Global
14:30 - 14:45 - Session 2 - Partner Presentation


The variety of security tools analysts use is partly responsible for hindering the incident response process. New tools require employees to learn how to use them and integrate with tools that the company already uses. These processes take up a lot of time and resources and increase the complexity of understanding and responding to security incidents.

When the ability to protect yourself in seconds makes a difference this session examined how we can switch to a proactive security strategy to fill the gap to conclude between detection and response.


  • Frank Kölmel, VP Central Europe at Cybereason
14:45 -15:15 - Session 3 - Open Discussions and Q&A


The rise of Coronavirus has caused many organizations worldwide to transition their employees to work from home. While necessary to protect employees’ wellbeing in the time of a health crisis, remote work also facilitates cybersecurity threats that must not be ignored. Employees that are working from home need to be educated on the most important steps to take to avoid having their corporate devices or data compromised, especially when their organization has not had the time or resources to implement a strong set of remote work policies, technology, and training, which is the case for many organizations today caught off guard by the worldwide pandemic.

Panel Questions:

  • How can we disruptively accelerate Cyber Safe behaviors?
  • What are the core risks of working from home?
  • What have you seen happen in your environment?
  • What do you expect in phase 3?
  • Do you have changes in true positives and/or false positives?
  • Are you having a new dialog with the business?
  • Have you done any tabletoping?
  • What technologies are central to your flexibility and continued operations?
    a. IT in general
    b. Security specifically
  • Is senior management attuned to the adaptive nature of risks and threat and are you talking regularly?


  • Oliver Schwabe, Global IT Risk and Compliance at Rolls Royce

Register Now