(844) 627-8267 | Info@NationalCyberSecurity
(844) 627-8267 | Info@NationalCyberSecurity

Talking Shop: A Consumer Sector Podcast Series – EP3: Confronting Cybersecurity Complexity – Security | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware



To print this article, all you need is to be registered or login on Mondaq.com.

Confronting cybersecurity complexity

Cam Whittfield and Phillip Magness join Aoife Xuereb to discuss the risks and
protections every board and management team needs to know in
tackling cybersecurity complexity in the consumer sector.

Cam and Phillip share real-world observations on current cyber
threats, the role of lawyers in incident response, engaging with
threat actors and understanding cyber insurance. They underline
practical and transparent approaches to people, process and
technology for resilient supply chains.

For more on cybersecurity, check out our TechQuake series and how to survive the era of cyber insecurity.

Herbert
Smith Freehills Podcasts · Talking Shop: EP3 – Confronting
cybersecurity complexity

About Talking Shop

Expert insights for navigating the big trends and key issues
redefining the global consumer sector. From rampant digitisation
and supply chain reinvention to sustainability and geopolitical
factors, the consumer sector is fast-evolving to meet the
challenges – and opportunities – facing companies
today.

Join our hosts Aoife Xuereb and Andrew Rich as they ‘talk shop’ with
special guests unpacking the risks and opportunities for companies
as they navigate new markets, technologies and customers, whilst
managing operational, workplace and regulatory change in the
sector.

The content of this article is intended to provide a general
guide to the subject matter. Specialist advice should be sought
about your specific circumstances.

POPULAR ARTICLES ON: Technology from Australia

Separating Safely From A Partner

Kalus Kenny Intelex

It is not uncommon for families to have multiple ways to keep their family safe – from security cameras linked to phones, child tracking apps, Find my Phone, air-tags, and the list goes on…

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW