Current Status
Not Enrolled
Price
Closed
Get Started
This course is currently closed

Managing Cyber Risk During Disruption

15 June

APAC

Synopsis

Cyber criminals can strike at any time but when you are vulnerable, how will you respond? Has your organization assessed the risk and crafted plans to address the gaps?

This webinar provides a recap of cyber loss trends and examine a crippling cyber loss, where the losses extended beyond the destruction and distortion of data, causing interruption of network-dependent business and production to shut down.

It will also outline how a broad cyber risk assessment & mitigation and addressing the fundamentals of cyber security remain the best defense against the majority of attacks.

Speakers / Moderators

Kristian Walsh

Senior Account Engineer
FM Global

Pankaj Thereja

Cyber Risk Consultant Asia Pacific
FM Global

Maxwell Davis

Enterprise Risk Manager, Asia Pacific
Rolls-Royce

Event Summary

The panel shared with risk managers what additional steps can organisations take to mitigate the loss caused by a cyber attack. shared with risk managers what additional steps can organisations take to mitigate the loss caused by a cyber attack.

With network security being more vulnerable as many employees are on a work from home set-up, the threat of a cyber attack is growing ever more rampant. Aside from the financial impact, it costs the business its reputation and their clients’ confidence, which is non-insurable and causes long-lasting losses.

The presenters emphasized the importance of fortifying cyber security from multiple angles: physical security, information security and industrial control systems. They also highlighted the value of employee training, securing endpoints, multifactor authentication and network segmentation in preventing & delaying the spread of malware.

Some questions from risk managers: Many IT activities are outsourced; how can we ensure that our providers are providing the right risk management services? Are there contractual obligations in transferring risk to third-party IT Security providers, or would the overall risk stick with the asset owner?

More About This Event​​

Session Materials

Cyber INCIDENT Simulation FORUm