IRM presents Cyber Risk Briefing - in association with Tripwire

Practical strategies for cyber risk at board level

This exclusive dinner discussed how to restore trust to critical systems after a breach

All too often, news reports of data breaches focus on:

  • What happened leading up to the event

  • How the breach may have occurred

  • What sensitive data the attackers may have compromised

  • Who will be impacted by such a breach

Yet there are a myriad of issues and questions an organisation must confront in the aftermath of a security breach such as:

  • What parts of its network infrastructure can be trusted?

  • How robust is the security programme in place?

  • What are the financial impacts?

  • What will be the damage to our brand?

  • What will the legal implications be?