Panel discussion: Risk: Fostering a risk-based approach to information security

    1. Location
      Keynote Theatre

Panel discussion: Risk: Fostering a risk-based approach to information security

23 Apr 2013, 11:15 - 12:15

Keynote Theatre

Language:
English

Understanding risk exposure and applying risk management to information security is integral to improving your organisation’s security posture and cyber resilience. Effective risk assessment and risk metrics can be used internally to demonstrate information security’s value to the business, drive accountability and prioritise investment. But what does risk really mean for information security and how do you put it at the heart of your strategy? What are the risks and what do they mean for your business? And what do you do if there isn’t a formal enterprise risk management framework within your organisation? This session will look at strategies to utilise risk management to protect your information assets in a way that reflects the value of that information to your organisation.

  • Discover how to integrate information security risk into an enterprise risk management framework
  • Determine how to balance risks with response and budget within your organisation

  • Understand how to communicate risk to the Board and which risk indicators to use

  • Learn how to assess risk and gain the tools and techniques to manage and mitigate risk

  • Gain best practice tips and hints on how to de-risk IT provision

 

Contributors

Documents

Business Issues Covered

• Deliver security to drive and enable clear business growth • Demonstrate clear thought leadership to ensure security is high on the corporate agenda and capex justified • Ensure information security projects demonstrate return on investment • Identify internal and external threats and keep a business secure • Benchmark your security posture and strategy against your peers • Gain insight from the leading figures in information security

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.