The Business of Cybersecurity
9:30 a.m. - 11:00 a.m.
Once seen as a business blocker, Cybersecurity is now being reframed as a significant business enabler to support agility, innovation and growth as well as being a competitive differentiator. The days of security being perceived as the Department of ‘No’ are coming to an end,” as cited by a recent IDC study in which 70% of organizations said they now see security as an enabler, a 21% point improvement over the past couple of years. A business that has taken steps to protect itself from cyber threats is much more likely to reduce the impacts to productivity that can result from an attack. The path to a successful cybersecurity strategy therefore needs to balance its activities between enable business and minimizing risks and reducing the likelihood that systems and data are used in a way that would cause financial, reputational or physical harm.
Ricky Duman
Director of Pre-Sales Engineering - DigitalEra Group
Cyber Risk Quantification:
Measuring the Real Cost of Cybersecurity. Ask the Right Questions to Get the Right Answers
11:00 a.m. - 12:30 p.m.
Risk quantification is experiencing wider acceptance as a methodology. One reason is the growth of companies' access to historical data. Another reason is that risk quantification makes it easier to communicate your risk posture to the Board and key stakeholders. Viewing risk numerically and expressing the math in relateable and measurable terms leads to better understanding and alignment throughout your organization. The security budget is only a part of the story describing the real cost of cybersecurity. Other costs include elements like the IT budget, business friction, internal risks, vendor risk management and business partner costs. Measuring the all-in costs for security enables an organization to make better-informed decisions and gain greater control over its security costs.
Dirren Harkoo
Cybersecurity Lead - Phoenix Park Gas Processors Limited
Ravi Ragoonanan
Cyber-Security & Risk Lead - Proman
Samantha Deoraj
Major Account Manager - Fortinet
MODERATOR
Cybersecurity Governance & Compliance as the Path to Cyber Maturity
1:35 p.m. - 3:00 p.m.
Cybersecurity is common agenda item for boards of directors across all industries, with 88% of respondents to the 2022 Gartner “View from the Board of Directors Survey” now regarding cybersecurity as a business risk and not a technology risk. As a result of this, cybersecurity leaders are up against a variety of different edicts, trends and issues as they continue to master their craft in building and evolving a cybersecurity-conscious board. This session will discuss the biggest cybersecurity board reporting dynamics today, their implications to leaders, and ways to effectively incorporate these into their current board reporting. Why good Governance structure is a key to maintaining a proper Cybersecurity program? Traditionally, cybersecurity is viewed through the lens of a technical or operational issue to be handled in the technology space. Cybersecurity planning needs to fully transition from a back-office operational function to its own area aligned with law, privacy and enterprise risk. The CISO should have a seat at the table alongside the CIO, COO, CFO and CEO. This helps the C-suite understand cybersecurity as an enterprise-wide risk management issue - along with the legal implications of cyber-risks - and not solely a technology issue.
Ziyaad Khan
Manager – Information Technology & Systems – Atlantic
Angus Smith
Manager - The Trinidad and Tobago Cyber Security Incident Response Team (TT-CSIRT)
Israel Castillo
Customer Engineer, Data Analytics - Google
Brian Keshwah
Cybersecurity and Information Technology Audit Manager
MODERATOR
Cyber Hygiene: A Critical Part of the Security Toolbox
3:25 p.m. - 5:00 p.m.
In today's ever-changing threat landscape, it's more important than ever to create a cyber hygiene routine that can prevent cybercriminals from causing security breaches, installing different types of malware, and stealing personal information from you and your customers. As with personal hygiene, cyber hygiene involves developing important habits. Many organizations rely almost exclusively on cybersecurity professionals to carry out day-to-day tasks designed to protect themselves and their end-users' sensitive data. This is a mistake. Every employee needs to understand basic cyber hygiene practices and their role in protecting and maintaining an organisation's IT systems and devices. This will enable better incident response and provide immediate and effective defenses against cyber attacks. In the case of cyber hygiene, those habits help computers and other devices that rely on connectivity perform at their best. Good cyber hygiene helps protect against vulnerabilities by accounting for various risks. This practice helps individuals and businesses keep their data safe, preventing malware and other attacks from breaching networks and devices. An assessment of American cybersecurity practices found that even though 88% of Americans report they take necessary steps to stay safe from cyberattacks, less than half actually perform the bare minimum when it comes to cyber hygiene. Hackers, identity thieves, advanced viruses, and intelligent malware are all part of the hostile threat landscape. While predicting threats can be challenging, preparing and preventing them becomes feasible with sound cyber hygiene practices.
Emmanuel Oscar
Senior Systems Engineering Manager for the Caribbean - Fortinet
Terrence Nichols
Information Security Manager -
ANSA McAL Group of Companies
Ansarah Ali
Project Implementation Manager - Ministry of Digital Transformation
MODERATOR