Roundtable 5 - Preparing for a ransomware attack – how to formulate an action plan to mitigate risk
Although IT remains an integral part of a strategy to defend against cyber-attacks, cybersecurity is no longer an IT issue. A robust cybersecurity strategy needs to be centred around managing business risk encompassing key elements such as regulatory, legal and investor obligations, supplier and vendor management, and employee awareness.
Whether you already have a full cybersecurity strategy in place or you’re only just beginning to pull one together, this round table
will provide attendees with some ideas around formulating a high-level plan, as well as outlining key risks and mitigation strategies around cybersecurity.
Example discussion areas:
- How have cybercriminal groups evolved in their organisation and how have their Tactics, Techniques and Procedures (TTP’s) evolved with them?
- The delineation between threat prevention and threat response to a potential cyber-attack. What capabilities / resources do you need?
- Establishing policies and procedures to mitigate risk
- Incident response planning. To pay or not to pay a ransom