Hello my name is Stephen Thurlbeck and I am
pleased to be taking you through Cybersecurity threat prevention.
As a company that focuses on C- level thought leadership, business transformation,
and bespoke software development and integration,
Cybersecurity is front of mind and close to my heart.
In the next 30 minutes or so,
we will be exploring where vulnerable information lives,
the evolution of threats and finally
the anatomy of a data breach and preventative steps that you should be taking.
Despite training, years of preparation,
and a lot of long days troubleshooting and mitigating issues,
I continue to come across situations I've not previously seen.
As well as issues that should have been resolved years ago.
We're going to walk through a few statistics
and definitions to start
and then, I'm going to help you understand
where your data lives and when it's vulnerable.
I will provide some insight into the past to help us understand where we are now,
and we're going to walk through the evolution of a data breach;
and then talk through prevention and diffusion.
At the end of this seminar,
you will understand data states,
levels of vulnerability in the kill chain.
I'm going to respond to some frequently asked questions,
and provide details around controls,
and talk about prevention.
Finally you should walk away from this seminar with a few pointed questions for
your teams and some specific Cybersecurity risk mitigation steps to follow.
I hope you enjoy your time with me.