InPhySec ALGIM Breakfast
Date and time
PRACTICAL RESPONSES TO GROWING CYBER THEATS
About this event
We don’t know how long the physical war in Ukraine will continue. But we can say that the cyber war started much earlier and will continue much longer after the guns fall silent. We can also safely say that New Zealand and New Zealand businesses and government agencies will not be immune from the consequences of that online conflict. We can already see enormous mobilisation of people for the online fight. And we can see – and predict – that, like all wars over the last 10,000 years, this one will spur innovation in technology, organisation, motivation, and financing. These new techniques, technologies, and groupings will spill over into online crime in coming months, and some of that will come our way.
Please join us for a breakfast briefing, to discuss innovative cybersecurity approaches to detecting and preventing this next generation of threats.
Speakers
IAN FLETCHER | InPhySec Co-Founder and Principal Consultant: The Cyber Partner. Observations and learnings from InPhySec’s work on the front line.
Over the past 18 months we have undertaken or are undertaking significant post-incident reviews following several large, high impact cyber incidents. This has shed direct light on levels of preparedness, governance issues, incident management and recovery processes, and accountabilities to regulators and stakeholders.
CAROL COTTAM | Information Services & Technology Manager & Deputy GM Corporate Services, Northland Regional Council: The Cyber Journey. Observations and learnings from the front line.
SIMON DARTFORD | Regional Sales Manager, CrowdStrike & DANE BLACKMORE | Country Manager NZ, Netskope: Through integrated solutions, organisations can take a powerful, proactive approach to enterprise defence.
The increasing use of cloud services and the ability to access them from any device makes cloud and endpoint critical points for security. Netskope and CrowdStrike together create a defense-in-breadth solution, extending advanced threat detection across endpoints, and into cloud applications. Automated exchange of threat information reduces the time required for threat detection, forensic analysis, and prevention. Improving the speed and efficacy of response to these threats can have a huge impact on their ability to cause chaos and financial damage.