The assets of an organization are exposed to loss from cyber-related perils in many ways: directly, such as through unauthorized access, ransomware or spyware; and indirectly, such as through infrastructure sabotage or failure. Implementing defenses against all of these perils takes time, money and resources. How should an organization set priorities to protect the most important assets from the most salient perils?
During the 2017 Cyber Risk Conference, experts explored the process of protecting the organizations' important assets from the full spectrum of cyber-related perils. Opening keynote speaker Sujeet Shenoi from the University of Tulsa addressed cyber operations, critical infrastructure protections and digital forensics.
Panel topics included assessing crown jewel risks, risk mitigation strategies and risk transfer and post-breach loss control. The conference’s closing keynote was led by Anatoly Bodner, an application, information and infrastructure security specialist, and partner with IBM’s X-Force Cloud Security Services.