Mercury IT’s Business Cybersecurity Risk Webinar Series is designed to help businesses understand and better manage their Cybersecurity risk. At the centre of the series is the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST).
Presenter Chris Haigh, Chief Information Security Officer (CISO) at Mercury IT, has over 20+ years’ experience in Cybersecurity and explores the five key elements of the framework… Identify, Protect, Prevent, Respond and Recover from Cybersecurity risk.
In conjunction with Chris, guest speakers and additional industry experts joined throughout the series to share their knowledge.
Part 1: Identify- Guest speaker: Philip Meyer, Partner Technology Strategist, at Microsoft for 29 years (Sydney, Australia).
Learn how the Identify function assists in developing an organisational understanding for managing cybersecurity risk to systems, people, assets, data, and capabilities with a focus on Microsoft Intune and Secure Score.
Part 2: Protect- Guest speaker: Jacqueline Jayne, Security Awareness Advocate for the APAC region for KnowBe4.
Discover how the Protect function helps support the ability to limit or contain the impact of a potential cybersecurity event, with a spotlight on KnowBe4 the provider of the largest security awareness and simulated phishing platform.
Part 3: Detect- Guest speaker: Matt Carling, Architect, Security and Trust Organisation, at Cisco for 20 years (Canberra, Australia).
Find out how the detect function defines the appropriate activities to help identify the occurrence of a cybersecurity event and also enable timely discovery, included in this webinar a snapshot of the Australian Government Australian Cyber Security Centre – Advisory 2020-008: Copy-paste compromises – tactics, techniques and procedures used to target multiple Australian networks.
Part 4: Respond- Guest speaker: Martin O’Riordan, General Manager and Head of Cybersecurity at Mercury IT (Gold Coast).
Discover how the Respond function assists in outlining the appropriate actions to take regarding a detected cybersecurity incident, whilst also supporting the ability to contain the impact of a potential threat. Find out more about notifiable data breaches and putting a response plan in place for your business.
Part 5: Recover: International guest speaker: Frank Briguglio, CISSP, Public Sector Identity Governance Strategist at SailPoint (USA).
Learn how the Recover function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. Includes a final summary of the NIST Cybersecurity framework.
If you have any questions or you would like further information on Cybersecurity please contact email@example.com