Cyber Risk: A Structured Approach (Copenhagen)27th of February 2020 - 13:00-15.00
To understand how to structure your IT security and prioritise your resources, you need to be able to measure your current security maturity based on facts and documented with scores. This allows you to create a roadmap with concrete actions and priorities, improving your security posture over a defined period of time.
At this event, we will show you how to get an overview of the cyber risks facing your organisation, and how to measure and improve your security posture with a structured approach to IT security.
- 27th of February 2020
- FortConsult HQ
Svanevej 12, 2nd floor
- How to get an overview of your actual security posture
- How to prioritise your investments and your efforts in IT security
- How to create roadmaps for improving your security maturity, with concrete and actionable steps
- How to measure success
Lessons Learned from 14 Years as a CISO
Executive Advisor Kim Aarenstrup is one of Scandinavia's most experienced IT security experts. He has spent more than 25 years in the field, some of them as a CISO at one of the largest global companies in the Nordics. Kim also has 20 years of experience in the Danish police, most recently as founder and head of the Danish National Cyber Crime Centre. You will hear war stories from the real world and examples of how the interactions between the management and board are crucial to the overall resilience to cyber threats.
Live Hack: The Weak Password
One of our technical security consultants will perform a live hack to show you how weak passwords can give malicious hackers easy access to your organisation.
Creating a Roadmap - Where to Start
Our cyber security review lead Tina Löwe, who has more than 15 years of experience with implementing infrastructure, networks and security, will share examples and concrete recommendations from her vast experience with helping companies quantify, measure and improve their overall security level. Tina will demonstrate best practices for improving your security posture, by prioritising security actions, creating roadmaps and consistently quantifying and measuring your progress.