Monday 23 May 2022, 11am-12noon (BST)
The use of data, particularly personally identifiable information, has enormous commerce potential but also the risk of abuse. Organisations are paying closer attention to how they manage information than ever before. The rise in cyber attacks, which expose personal data, has shed new light on how companies oversee information and technology through processes, people, and culture.
In this fascinating two-part series from BSI, Tom invites us to consider the governance that sets the direction of our organisations and the inputs, outputs, and risk alignment of this.
In this first session, we consider:
- Why do we have all this technology?
- Who has the power, and how is this power exercised?
- The inputs influencing governance, such as regulation, industry, ethics, and culture.
- How can we ensure that senior management and the board understand our cyber risks to make informed decisions?
Tom demonstrates a holistic approach to cybersecurity and how we ought to centre on our workforce, with all the smart technology being the bolt-on: “Academically, the risk appetite is there, but practically, the budget and resources may be misaligned.”
This is set to be an enthralling series, which will provide much food for thought for us all. The second part, How to consider policies and procedures when implementing effective risk management, will be held on Friday 1 July. You can register for the second session here.
Guest chaired by
Oscar O’Connor (info), Chief Storyteller, Oscar O’Connor & Company
Tom Brett (info), Global Lead-Training, BSI Group