Engaging Your Line of Business for Cyber Security Initiatives

Address internal vulnerabilities and operationalize security initiatives with first line employees

Security cannot be done in a silo. 34% of cyber security professionals see unaware employees as the biggest vulnerability to their security ecosystem.


This webinar will take place on:
August 05, 2020
10:00 AM - 11:00 AM EST

Security cannot be done in a silo. 34% of cyber security professionals see unaware employees as the biggest vulnerability to their security ecosystem.

Evolving threat landscape

Have businesses accounted for the shifts in liability, and what measures can organizations take to protect themselves as the risk and threat ladscape continuously evolve?

Streamline response 

Accounting for expanded system vulnerabilities across corporate and hone office networks what considerations should business account for to realize their increased attack surface. Leverage technology to integrate system monitoring and streamline response to prevent harmful risk impacts.

Key takeaways include

  • Communicating meaningful insight and direction to first line business users and board executives, translating risk beyond impact and likelihood
  • Engaging regular oversight to deliver real-time insights into control effectiveness and security performance
  • Avoid sunk cost in combatting exponential and uncertain external threats

Presenters:

Scott Bridgen
GRC Consulting Director
OneTrust

Scott Bridgen serves as a GRC Consulting Manager for OneTrust GRC– a purpose-built software designed to operationalise integrated risk management. In his role, Scott is responsible for driving the development and delivery of OneTrust's integrated risk management product as well as driving the refinement of the toolset and offerings. He advises companies throughout their risk management implementations to establish processes to support operations and align with their enterprise objectives, including adopting industry best practices and adhering to requirements relating to relevant standards, frameworks, and laws (e.g. ISO, NIST, SIG and more). Scott works with clients to realise the extent of their risk exposure, helping clients to map their digital infrastructure, assess risks, combat threats, monitor ongoing performance, and document evidence throughout the risk lifecycle.

Sponsored By: