“Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat” - Sun Tzu - The Art of War
Developing an appropriate cyber strategy is vital for every business. Ensuring that the cyber strategy is aligned with and supports the business strategy is an imperative for every board. Staying informed with appropriate metrics and being empowered to make risk based decisions is all part of cyber governance and oversight.
Most organisations have subscribed in principal to certain frameworks for security and privacy requirements BUT is this piecemeal approach really strategic? Is this approach providing the contextual support for digital transformation? Is this approach simply a compliance and regulatory burden on the business or does it empower the business to meet their goals and objectives?
“Transforming a business vision into actions, whilst protecting the business is the core objective of a cyber security strategy”.
Understanding the inherent cyber risk of the business model is the key initial step in developing an appropriate strategy with supporting framework. Join Paul C Dwyer CEO of Cyber Risk International (CRI) as he outlines the key steps in developing a cyber strategy for your business. A strategy that will support business growth, manage risk and satisfy regulatory compliance and related stakeholders.
Referencing real life case studies and showcasing some of CRI’s award winning technology “CyberPrism”, Dwyer will deliver a fast paced boot camp styled presentation to an informed audience of CIO’S, CISO’s, CRO’s and senior executives responsible for delivering a cyber strategy for their organisations.
Jim Friars, Chief Executive of the Irish Computer Society will also be speaking on the ICS plan for the IT profession and security-privacy professionals
Speaker profile: Paul C Dwyer
Paul C Dwyer is recognised as one of the world’s foremost experts on cyber security, risk and privacy. As CEO of Cyber Risk International he specialises in corporate and enterprise security, development of cyber defence programs, and business operations protection for CRI clients.
Certified an industry professional by the International Information Security Certification Consortium (ISC2) and the Information System Audit and Control Association (ISACA). Approved by the National Crime Faculty and the High Tech Crime Network (HTCN). He has worked extensively around the world, his diverse career spans more than 25 years working with military, law enforcement and the commercial sector.
Registration: 10:30 am
Start: 11:00 am
Finish: 01:00 pm
How to book
This event is being hosted by Cyber Risk International. You can book your free place on their website here: https://cyberprism.com/developing-a-cyber-strategy/
10th Mar (Tue)
Begins at 10:30 and ends at 13:00