You've survived the breach. Now what? Exploring establishment of an effective and resilient post breach security program and roadmap

Tuesday
 
18
 
March
, 
3:50 pm
 - 
4:30 pm
Location
Think Tank 1

Speakers

Saad Ayad

Saad Ayad

Principal Strategic Cyber Security Consultant
Google

Synopsis

In the current threat landscape, suffering a data breach is a matter of "when," not "if." This session provides a comprehensive guide to establishing a battle-tested post-breach security program, enabling your organisation to not only recover from an attack but to emerge more secure and resilient to threats. Moving beyond reactive incident response, we'll explore a proactive framework for navigating the aftermath of a cyber breach, with a particular focus on the complexities of advanced persistent threats (APTs) and nation-state actors.

Drawing on extensive experience responding to some of the biggest breaches in the region, this session consolidates years of practical experience into actionable strategies and insights, to delve into the critical steps of building a successful post-breach program.

Strategic Assessment - Laying the Foundation:

Moving beyond reactive incident response, this session emphasises proactive assessments to drive strategic security improvements. We'll explore the elements of conducting a comprehensive analysis that uncovers risks and informs the development of a pragmatic security roadmap. Strategically evaluating your current posture, you can identify gaps, prioritise investments, and build a mature security program in the face of evolving threats.

Strategic Optimisation - Aligning with Business Goals:

Developing a tailored roadmap for strengthening your security posture is key. There is no one-size-fits-all approach to aligning your security transformation with your organisation's risk appetite and business objectives. This involves optimising security investments across people, processes, and technology to achieve maximum impact and ensure security enhancements support business goals.

Continuous Validation - Ensuring Effectiveness:

Maintaining a resilient and effective security posture demands continuous validation of your security controls. Implementation of mechanisms to continuously monitor and measure the effectiveness of your security measures. This involves establishing a proactive approach to identify and address security gaps, drift control, ensuring compliance with industry best practices and adapting to the evolving threat landscape.

Adaptive Review - A Culture of Proactive Security:

Cybersecurity is an ongoing journey that demands continuous adaptation. This session emphasises cultivating a culture of continuous improvement within your security program. We'll explore how to incorporate threat intelligence, lessons learned, and emerging best practices to proactively anticipate and mitigate future threats. By embedding an adaptive review process, your organisation can stay ahead of the curve and build long-term resilience.

This session will provide an overview of the evolving threat landscape, with a focus on nation-state actors and APTs, and guide you through a phased approach to cybersecurity transformation, encompassing assessment, optimisation, validation, and review. Leveraging real-world case studies of organisations that have successfully navigated breaches, providing valuable insights.

This session is designed for CISOs, security leaders, risk managers, and IT professionals who are committed to building a more resilient cybersecurity posture in the face of increasingly sophisticated threats.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.