Cybersecurity: Costs, Risks, and Benefits

Cybersecurity: Costs, Risks, and Benefits

 

Duration 6h 0min
Date Tue, Feb 28, 2017
Time 08:00 AM PST
11:00 AM EST
Speakers

How much should your organization spend on information security? What’s the potential cost of a major hack or data breach? What’s the risk that your enterprise will be hit by a cyberattack? How can you measure the benefits of your investment in cybersecurity?

Today’s businesses wrestle with these questions every day. On one hand, they look at their growing IT security expenditures and wonder whether they are spending too much – or not enough. On the other hand, the likelihood of a major data compromise – and the associated costs – have never been higher.

Cybersecurity: Costs, Risks, and Benefits will help you answer many of these difficult questions. This online event, hosted by the editors of Dark Reading, brings together IT security leaders, business executives, and cyber threat experts will provide you with a holistic view of the costs and benefits of information security investments.

Why Should You Attend?
If you’re a top executive, you need to be able to measure the risks and benefits of IT security in order to gauge the right amount of investment. If you’re an IT security professional, you need to be able to make a solid business case for hiring more staff and buying new technology. In either case, by attending you’ll get some formulas to help you evaluate the costs and benefits of IT security.

You will also get insight on how to measure risks and the performance of your IT security initiatives, so that you can evaluate the role that data security plays in your own organization, and the potential impact of future threats.

Cost – Find out the extensive toll a breach can take on an organization, and explore the investments needed to protect it.
Risk – Understand the likelihood of your organization being breached and whether cyber insurance is worth the investment.
IT Security – Get information as to the costs of IT security, cost management, and demonstrating performance and growth in the efficiency of the IT security department.

What You Will Learn:

  • How damaging a breach can be to your business - from a financial, legal, brand, and customer/supplier relationship standpoint.
  • Ways to manage IT security costs while achieving the greatest efficiency.
  • Valuable information about cyber insurance policies and whether they can be the answer to the IT security spending question.
  • Methods for measuring the cost of a breach as well as the likelihood that your organization will suffer such an event.
  • Ways for measuring IT security performance, as well as justifying the cost of new IT security spending.
  • How to build a “business case” for IT security and how to demonstrate performance and growth in the efficiency of the IT security department.

AGENDA:

Keynote: The Real Costs of a Security Data Breach
11:00am – 11:45am ET (followed by a 15-min Commentary Desk)
A top expert offers business-level view of a major data breach. The speaker will not only discuss the damage that an attacker can do and the cost to repair it, but potential legal fallout and the impact of a breach on an organization’s brand and customer/supplier relationships.

Keynote: Evaluating and Managing the Costs of IT Security
2:15pm – 1:15pm ET (followed by a 15-min Commentary Desk)
An industry expert discusses the costs associated with enterprise security – not only the technology investment, but personnel costs and administrative overhead. You will get a better sense of the most costly investments made in IT security, and how to manage those costs to get the greatest-efficiency.

Keynote: Cyber Insurance: A Risk Management Tool?
1:30pm – 2:30pm ET (followed by a 15-min Commentary Desk)
An expert on cyber insurance costs and policies answers questions on whether insurance is an answer to the IT security spending question. You will get answers on how much a cyber insurance policy will cost, how it works, and whether it will cover all of the damage incurred by a major data breach. You will also get advice on whether investing in cyber insurance can lead to reduced investment in cybersecurity technology and staff.

Panel: Measuring Cybersecurity Risk
2:45pm – 3:30pm ET
Gauging the potential cost of a cybersecurity breach isn’t just a question of estimating the damage it might cause – it also means evaluating the likelihood of a compromise. In this panel discussion, top security experts will discuss methods for measuring the cost of a breach as well as the likelihood that your organization will suffer such an event in the days ahead. You will get advice to measure the threat to your specific organization, as well as the potential costs, to arrive at a risk model that you can use to make security spending decisions.

Panel: Measuring the Performance and Benefit of an IT Security Department
3:45pm – 4:30pm ET
One of the most difficult questions that IT security managers face is how to prove that their efforts are a benefit to the business. In this panel discussion, top security experts discuss methods for measuring IT security performance, as well as justifying the cost of new IT security spending. You will receive recommendations on how to build a “business case” for IT security and how to demonstrate performance and growth in the efficiency of the IT security department.


Explore Our Virtual Event Environment:
Get an insider look at these key spaces in this virtual event, prior to attending:

Lobby: Where you arrive once you register and login
Content zones: Where you can collect resources like white papers
Auditorium: Where you view webinars and panel sessions

imageimage

 

Don’t delay! Register today to get a clear understanding of the risks your organization faces, information on how to measure risks and the performance of your IT security initiatives - so that you can evaluate the role that data security plays in your own organization, and the potential impact of future threats.

 

Diamond Sponsors:
Diamond Sponsors
 
Platinum Sponsors:
Platinum Sponsors
Already a member? Login