Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
What to Upload to SlideShare
Loading in …3
×
1 of 12

Business Continuity, Data Privacy, and Information Security: How do they link?

0

Share

Download to read offline

Considering the increased number of cyberattacks and the significant damage caused to the IT infrastructure, organizations should ensure that their efforts to secure IT operations are linked with efforts to maintain resiliency within organizations.

The webinar covers

• Cybersecurity during pandemic through statistics
• Attack trends during pandemic
• Mitigating steps to take
• Relevance of IT Disaster Recovery in the time of Cloud computing
• Achieving optimal alignment and efficiency regarding your ISMS, BCP, BIA and Risk Management efforts
• Post-pandemic cyber and privacy considerations
• BCP and pandemic scenario planning 'beyond COVID'
• How to keep your privacy policy and incident response plan actionable
• How to keep your BCP short, sharp, up-to-date and user-friendly during an actual invocation

-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: https://pecb.com/whitepaper/iso-27001-information-technology--security-techniques-information-security--management-systems---requirements
https://pecb.com/en/education-and-certification-for-individuals/iso-iec-27701
Webinars: https://pecb.com/webinars
Articles: https://pecb.com/article
Whitepapers: https://pecb.com/whitepaper
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION

Youtube video: https://youtu.be/0AbrywA5oic

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Business Continuity, Data Privacy, and Information Security: How do they link?

  1. 1. .
  2. 2. . 99% of claims ($537M in total) from Small to Medium Enterprises (SMEs) with less than $2 billion in annual revenue RSM / NetDiligence $354,000 Average cost of ransomware attacks for small to medium enterprises who claimed insurance RSM / NetDiligence of global IT leaders delayed security priorities when the world stayed at home 93% Tanium
  3. 3. . Phishing Process Technical Regulatory The effects of a divided workforce, now only connected via technology, allows potential attacks to exploit the trust of employees and flaws in technology to gain access to company resources. The COVID-19 pandemic has increased the complexity of cybersecurity challenges for organizations due to reliance on less secure networks (e.g., home offices) to remain productive, as well as increased reliance of third-parties. Adversaries are unleashing a variety of attacks that only larger organizations may be equipped to identify and defend against. Ransomware attacks Attacks against healthcare providers Abuse of unsecure remote working infrastructure and culture
  4. 4. . “Is the sky falling? What should we do? We don’t want to be the next victim”
  5. 5. . "Why would we make IT Disaster Recovery Plans? We've got everything in the Cloud, so we're protected."
  6. 6. . "We've already had ISMS, BCP, BIA and Risk workshops... where does it end? We're workshopped out!"
  7. 7. . “What do we need to consider post-pandemic? What about the habits develop during the pandemic? Or is it over yet?
  8. 8. . "Why bother investing time and effort into BCP, now that COVID has made us experts? We already know how to work from home.”
  9. 9. . "You want us to do some pandemic scenario planning? Isn't that a little late? We’re at the end of the pandemic!"
  10. 10. . “We have an Incident Response Plan, a Business Continuity Plan, and a Privacy Policy, but no one understands them!”
  11. 11. . “BCP feels like Mount Everest... that plan has so many pages... and still I didn't have a clue which one to look at when a real incident happened."
  12. 12. THANK YOU ? rinskeg@businessasusual.com.au Rinske Geerlings Seyed.Hejazi@rsmcanada.com Seyed Hejazi Horia.Soltani@rsmcanada.com Horia Tabatabaei Soltani

×