Venue
Online

What is Qwoted?

Qwoted is a free expert network: we help reporters connect with experts & we help those same experts build relationships with top reporters.

Location Online
Region All
Details

The forum will address:
• Effective cyber resilience through scenario planning
• Tactics to enhance catastrophic cyber-attacks preparedness
• Benchmarking best practices and key takeaways on cyber stress tests
• Identifying your most critical systems and how they function
• Identifying business-critical applications and data for optimal protection
• How to accelerate recovery from data breach or similar disruption
• Cyber resilience within Business Continuity Planning and disaster recovery

Agenda:

• Futureproofing cyber security for financial institutions - The APAC Perspectives
Cyber risks driven by disruptive events such as geopolitical turmoil, pandemic
How have financial institutions responded – what else needs to be done?
Regulatory agenda and impact on daily cyber security efforts
The need for a robust Cyber Resilience Plan (CRP)

• Effective cyber resilience through scenario planning
Scenarios reflecting greater multi-stakeholder cooperation and a more fragmented, individualistic response
How to strengthen individual awareness and responsibility around cybersecurity with a wider systematic approach to the challenge
Scenario planning as a prediction tool to prepare for a range of plausible scenarios
Case studies on how scenario planning has helped financial institutions prepare for risks that bear similarities to events such as Brexit and COVID-19

• Benchmarking best practices and key takeaways on cyber stress tests
How to be imaginative when developing scenarios for the test
Reporting results to senior management – overcoming the pain points
Engagement the right employees within the firm to conduct the stress test
Best practices on testing and validation

• Identifying business-critical applications and data for optimal protection
How digital transformation has accelerated demand for better protection
Conducting assessment on the most critical systems and how they function
How to prevent credential theft and lateral movement, while providing a full audit trail of all privileged activity involving business-critical
applications and admin access.
Limit the risk from unmanaged end user workstations

• Cyber resilience within business continuity planning and disaster recovery
Cyber resilience vs Business resilience
Develop and adjust your Data Recovery Plan to be cyber-resilient
Case study: How to accelerate recovery from data breach or similar disruption
Cyber Resilience Plan (CRP) complementary to the Business Continuity Plan (BCP)
Delivering IT services with a priority objective of protecting sensitive assets (Availability, Integrity, Confidentiality, Proof) and strategic business