Saturday, April 13, 2024
HomeSECURITYWe invite you to an online meetup about building an effective information...

We invite you to an online meetup about building an effective information security strategy

-


We invite you to an online meetup about building an effective information security strategy

On June 22 at 11:00 am, K2Tech, Head of IS Consulting, will tell you how to develop an IS strategy.

erid: LjN8K7fgs

According to Kaspersky, 168 publications of databases of Russian companies were recorded in 2022, delivery services (34%) and retailers (14%) suffered the most from leaks. Fintech companies and retailers also suffer from DDoS attacks – 83% and 62%, respectively, according to StormWall.

Data theft, information leaks, DDoS attacks, social engineering – this is an incomplete list of challenges that require an immediate response from the head of information security. Today, companies need to quickly provide real protection for their IT infrastructure. Wherein, according to K2Tech survey 50% of companies still have not developed an information security strategy and have no understanding of possible attack vectors within their IT landscape, while 16% do not rely on risk analysis results, which can significantly reduce its effectiveness, especially when it comes to targeted attacks.

Find out what to do if:
– You do not have a clear vision of what is happening in IB
– The level of real security of business assets is not clear
– It is not clear which information security solutions require implementation in the first place
– No development plan and roadmap

On June 22 at 11:00 a.m. (Moscow time), the online meetup “IS Management: A New Hope. Learn how to implement an effective information security strategy.” Expert practitioner Olga Trofimova, Head of K2Tech Information Security Consulting, will tell you how to assess the state of information security, what should be included in a development strategy, and how to communicate with business in a language of risks and benefits that it understands.

Online meetup program:

  • Where to start: defining the goals and state of information security
  • Risk-based approach, pros and cons
  • New reality: is there any sense in the information security strategy
  • Is the information security management system the same for different companies
  • The management system has been implemented, what’s next?
  • Q&A session

Registration and details of the online meetup – link .



Source link

www.securitylab.ru

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular