Become Resilient to the Cyber Threat: Aarhus

4th of June 2019 - 12.00-15.00

Become Resilient to the Cyber Threat

According to Ponemon Institute, only one third of organisations believe that they have adequate resources to manage security effectively. To understand how to prioritise your resources, you need to be able to measure your actual level of security, based on facts and documented with scores. This helps you create a roadmap with concrete actions and priorities, improving your security posture over a defined period of time. FortConsult invites you to a free event, where we will show you how to measure and improve your security posture.

  • 4th of June 2019                                                        
  • 13.00-15.00 CET (Lunch at 12.00)                                                   
  • Horisont Hotel & Konference                                                             
    Agro Food Park 10, 8200 Aarhus N
  • CISOs                                                                             
  • CIOs                                                                                  
  • CROs                                                                             
Key Takeaways
  • How to get an overview of your actual security posture?
  • How to prioritise your spend and your efforts in IT security?
  • How to create roadmaps for improving your security maturity, with concrete and actionable steps?
  • How do you measure success?
Lessons Learned from 14 Years as a CISO

Executive Advisor Kim Aarenstrup is one of Denmark’s most experienced IT security experts, having spent more than 25 years in the field, some of them as a CISO at one of the country’s largest global companies. Kim also has 20 years of experience in the Danish police, most recently as founder and head of the Danish National Cyber Crime Centre. You will hear war stories from the real world and examples of how the interactions between the management and board are crucial to the overall resilience to cyber threats.

Live Hack: The Weak Password

One of our technical security consultants will perform a live hack to show you how weak passwords can give malicious hackers easy access to your organisation.

Creating a Roadmap - Where to Start

Our cyber security review lead Tina Löwe, who has more than 15 years of experience with implementing infrastrure, networks and security, will share examples and concrete recommendations from her vast experience with helping companies quantify, measure and improve their overall security level. Tina will demonstrate best practices for improving your security posture, by prioritising security actions, creating roadmaps and consistently quantifying and measuring your progress.

Register for free