ITF ‘Security Matters’ Forum Are we missing a trick in managing our risks? People, behaviours and the boardroom Nick Wilding, General Manager, Cyber.

Slides:



Advertisements
Similar presentations
Employability and Employer Engagement
Advertisements

Curriculum for Excellence Aberdeen City November 2008.
Child Safeguarding Standards
Strategic case for information & IT Acknowledgements to Euan Wilson (Staffordshire University)
Establishing Cyber Security education, awareness, training and trust for SMEs Roger Dean, Executive Director
Executive Insight through Enhanced Enterprise Risk Management Leverage Value From Your Risk Management Investment.
BNSF Ethics and Compliance Program Roger Nober Executive Vice President Law and Secretary July 13, 2011.
Grow Your Business through Contact Centre Outsourcing Fanny Vaz Director, Personal Market Unit, CTM.
Recognising the Risks of Cyber Threats Across the Organisation John Thornton Secretary to the Digital Government Security Forum.
Partner reward – a help or a hindrance to effective business development? Peter Scott Peter Scott Consulting
Crisis Leadership Business Continuity Technology & Operations Critical Incident Cyber Information Security KeyBank Presents Critical Incident at itSMF.
Tan Jenny 23 September 2009 SESSION 4: Understanding Your IT Control Environment & Its Readiness.
Individual and Team Development Forum
WHERE WE ARE 22 member associations in 20 countries Over 4300 individual members who are responsible for risk management and/or insurance in their organisations.
Supporting you to understand research governance and ethics Emily Lamont Senior Research Manager NFER Claire Easton Senior Research Manager NFER
The role of internal audit in enterprise-wide risk management (ERM)
Produced by BPA Australasia Pte Ltd (BPA). All rights reserved. Contents must not be distributed/quoted/used without the prior written permission of BPA.
PUBLIC HEALTH WORKFORCE LINCOLNSHIRE GOVERNMENT Isabel Perez, Consultant in Public Health 17 th June 2014.
Cyber Authentication Renewal Project Executive Overview June – minute Brief.
Taking the Chair A National Development Programme for Chairs, Vice Chairs and Chairs of Committees Module Three Activity 3.1 OHT 1.
Making our curriculum world class Looking after learners, today and tomorrow Mike Rumble Curriculum Adviser.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Queen’s Management & Leadership Framework
Security Trends & Industry Insights
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
CYBER RESILIENCE BEST PRACTICE. To Discuss Why cyber risk management is increasingly challenging How everyone has a role to play in your cyber risk management.
Welsh Baccalaureate Key information.
We help to improve social care standards a culture for care: is yours good enough?
Information Technology Assessment conducted by BerryDunn Consulting for the UA System March 9, 2015.
Essentials For Building A High Performance Team Hosted By: Dennis Sommer, PMP March 8, 2005.
12-CRS-0106 REVISED 8 FEB 2013 APO (Align, Plan and Organise)
Generic competencesDescription of the Competence Learning Competence The student  possesses the capability to evaluate and develop one’s own competences.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
Driving Innovation Preventing fraud in mCommerce SBRI competition briefing and panel discussion #mcommerce Wifi: Richmixpublic Password: richmix247 December.
Driving Value from IT Services using ITIL and COBIT 5 July 24, 2013 Gary Hardy ITWinners.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. H2020 Secure ICT Case.
IIA – Cyber Security Event Cyber Risks James Humbles June 2016.
Driving Innovation Preventing fraud in mCommerce SBRI competition briefing #mcommerce December 2012.
Business Acumen – PR as a Strategic Business Function 18 August 2016 Thabisile Phumo, APR.
The Need of CSIRT in Enterprise Keyur Desai – Vice President - IT
Collaborative & Interpersonal Leadership
Security and resilience for Smart Hospitals Key findings
Information Security Program
Chris Brown Chief Executive
Philippa Foster Back CBE, Director Institute of Business Ethics
The BT Intranet story.
Data Minimization Framework
Skills for Care update Laura Anthony Locality Manager – SW London.
and Security Management: ISO 28000
Who we are National Lottery funder for heritage
Effective Support for Children and Families in Essex – July 2017
Managing Risk in Turbulent Times How Nonprofits Can Respond to the Watershed Moment Ted Bilich September 7, 2017.
IT and Project Management Best Practice Training
National Cyber Security Programme Local : Building Resilience Together
ACTIONS FOR LOCAL LEADERS
How to approach a top-down call topic in Horizon 2020?
Creating a Cyber Resilient Population
The BT Intranet story.
The CYBERWISER.eu project
Final Conference 18 Set 2018.
Moving Ahead of the Competition
Transforming the way companies build wealth
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
Welcome to Successfully Appraising Staff Workshop
Strategic Leadership & Organisational culture
Document CWG-FHR-10/8 4 September 2019 English only
Presentation transcript:

ITF ‘Security Matters’ Forum Are we missing a trick in managing our risks? People, behaviours and the boardroom Nick Wilding, General Manager, Cyber Resilience, AXELOS 23 March 2018

Houston, we have a problem...

What can good can look like? Having the right people and appropriate skills to help exploit opportunities and manage risks Having a clear accurate assessment of the risk reduction effectiveness of your security controls ...an enterprise-wide response to the risks using best practice and the same business ‘language’ ...an active and innovative awareness programme across all people in the organisation ...having an organization that is focused on managing their cyber risks not just on being compliant ...a well informed Board who know their risks, set the right ‘tone from the top’ and how they would respond in a crisis

Technology is vital but can only do so much…

…does this approach work?

…and what about the boardroom?

No-one is immune Whaling for Beginners Hackers are hunting ‘whales’ in the boardroom. They attack, steal and ruin reputations. Out of nowhere, hard won reputations, competitive advantage, client trust, critical revenues and operational capabilities are all suddenly at risk. “It takes 20 years to build a reputation and 5 minutes to ruin it. If you think about that, you’ll do things differently” Warren Buffett

Questions and observations? Nick Wilding General Manager, Cyber Resilience E: nick.wilding@axelos.com T: 07860 950108