Exercise in a Box is an online tool from the NCSC which helps organisations test and practise their response to a cyber-attack. It is completely free, and you…
Before SolarWinds, in July 2020, an Atlantic Council feature stated: “Software supply chain attacks are a regular feature of cybersecurity but remain understudied as a tactic of malicious actors and a tool of cyber statecraft”.
Statecraft happens but, the fact remains that non-malicious actors cause the most frequent incidents (91% of breached start with phishing to an unsuspecting person – Deloitte. Jan 2020). With COVID the threat landscape has exponentially increased the opportunity for non-malicious actors to cause breaches, while hackers are using the soft-touch gateways to gain access to supply chains and corporate infrastructure
A panel of experts will discuss vital topics including:
1. The most common sources of attacks, referring to incidents, their implications and lessons learned.
2. Everyone has a role to play, because people are the first line of defence.
3. Economic training not only up-skills competency but develops a culture of cyber awareness and protection.
4. Standards, frameworks and taxonomy are the common foundations in building resilience.
5. Better communication via a common lexicon and cultural interaction between IT and Operations reduces risk and accidents.
Moderator: Peter Meehan, Co-Founder, Cybersecurity Workforce Alliance (CWA), SVP iQ4 Corp.
- Tim Harwood, Founder and CEO, Siker Ltd
- Carol Brooks, Managing Director, Platinum 3P Ltd
- Richard Stevens, Director of Education ASIS UK
- Eamonn Keane, Head of Cyber & Innovation, SBRC