IT GOVERNANCE CALLING UNITED KINGDOM C-SUITE MANAGERS:
This post is about why you should book a place at our Cyber War London Event:
If you are a C-Suite manager and you care about your organisation’s reputation, commercial advantage, share price and the cash in the bank… then I recommend that you join us in the bunker. [SFX: Air Raid Sirens] Read on…
Cyber War will not start at Midnight… it’s raging now. Are you in the fight?
Shocking though it is to report, the growing number of organised gangs and rogue states behind the escalation of cyber crime did not issue a media announcement before hacking into the systems of profitable businesses.
Global hacking without declaring a State of War? How jolly unsporting!
After all, you’re not meant to go around the Maginot Line. We’ve spent billions building firewalls and routers, installing intrusion protection and SIEM software, and now they are evading our best efforts by simply attacking us on the Cloud and infecting the CEO’s BYOD at home. Cheats!
Windows XP support will end: which organisations are actually ready?
The fact is, war on the internet is not due to start at midnight on a future date, like the one on which Microsoft finally withdraws patch updates for Windows XP (8th April 2014) – even though there are still ATMs that are running this stable and much-loved Operating System from a different age.
I’ve just bought Windows 8.1 myself. I realise that I was clinging to the technology that I knew. It’s actually quite good so far, despite bad press. That’s the trouble though, isn’t it? Our perception wanes as we grow a bit older. We want to fight the last war, not this one. It’s a natural mistake for all politicians, business leaders and organisational decision-makers to make.
Even in the mid-1930s the Royal Air Force’s front-line fighters were biplanes, little different from those employed in the First World War. The rearmament programme [NF1] enabled the RAF to acquire modern monoplanes like the Hawker Hurricane and Supermarine Spitfire, such that sufficient numbers were available to defend the UK in the Battle of Britain in 1940 during the early stages of World War II. In the British Parliament, the case for rearming was championed by the man who later came to lead the nation in a time of total war: Sir Winston Churchill, whose Cabinet War Rooms we will be commandeering (courtesy of the Imperial War Museum).
Thursday, May 8th, 2014: a date that will go down in your company’s history?
At 09:30 on May 8th, our event will begin. After an introduction by our Executive Chairman, Alan Calder, our keynote speaker, Neira Jones, will begin speaking on the subject of:
“The Global Cyber War: Using ISO27001:2013 and PCI DSS Version 3 to drive business, cost and security improvements”.
Her point will be that security isn’t necessarily a cost; it can be profitable to think in terms of protecting your own and your customers’ private data.
In the course of the day other cyber security experts, including UKAS technical advisor on Information Security, Steve Watkins, Bridget Kenyon, the Head of Information Security at University College, London, and Geraint Williams, a QSA and leader in the field of PCI DSS compliance, will explain what your organisation needs to do to protect its confidential data and achieve ‘cyber resilience’ – the cyber age equivalent of ‘Business As Usual’.
What can we do about Cyber Security – assuming that we are not doing it?
I sympathise with the C-Suite and senior IT managers over this question. There are as many answers as there are suppliers of software, hardware, technical services, consultancy and the gamut of training options out there.
Not surprisingly, everybody with a vested interest is claiming that they have the weapons that you need to defeat the terror of the cyber criminals. The noise from their marketing campaigns, strident ‘fear, uncertainty and doubt’ messaging and loud calls to action are in danger of defeating us all.
But wars are not won with new weapons alone. Technology often tips the balance in favour of one side or the other, just as a well-trained army with a high level of morale has a better chance of overcoming a poorly-prepared and frightened group of raw recruits. But in the end, the winners in the game of war are more likely to be those that understand the need for their people, processes and technology to work in a coordinated, strategic way.
So what measures should we be taking to protect our business interests?
First: think ‘People, Process and Technology’. (Note: not just Technology).
Second: do not fall into the trap of thinking that your organisation is too low-profile/small/not in an ‘at risk’ business sector to be a victim of crime.
Cyber attackers seek out vulnerabilities: if your system has them, attackers will exploit them. Sooner or later (and it may already have happened), you will join the burgeoning list of enterprises that have suffered a security breach.
Would you like to book your place? The cost is only £45+VAT.
For just £45 you could receive some of the best advice that you will hear in your career: advice that could help you to resource where needed, train staff across your organisation, and put in place procedures and controls to enable you to manage cyber security in line with HM Government’s advice.
In Churchill’s words:
ACTION THIS DAY!
Book your place now
Want our expert help, but can’t make this date? Then…
Read our page on Cyber Health Checks – find out if you need to close gaps in your own cyber security to be compliant with the Cyber Hygiene Profile.
* * * *
If you would like to find out more about ISO27001:2013 and how to set up and run an Information Security Management System (ISMS) to help you comply with PCI DSS Version 3.0, talk to our consultants on 0845 070 1750.
Bookmark this page as well!