SlideShare a Scribd company logo
Cyber heroes of
tomorrow’s world
Recovery
from Cyber Attack
October 2016
www.linkedin.com/company/cyber-rescue-alliance
First presented in Oct 2016. For other presentations at this event
www.linkedin.com/company/cyber-rescue-alliance
Cyber
Heroes
Maggie Philbin
TeenTech
How CEOs
can find heroes
for tomorrow’s
world
http://www.teentech.co
Cyber Security
Cyber Security – The film
Cyber Security – The film
‘”T“Thank you for a brilliant day.
This was the first time
my daughter has understood
where she might use her love
of Physics and Maths”
What qualities do I need?
1. Creativity
2. Willingness to learn new things
3. Adaptability
4. Bold thinking
5. Ability to collaborate
6. Ability to strategise
7. Curiosity
‘They talk about ‘
without advising or
‘They give the same advice
to everyone when we are all
different in our ways’
‘We need to know more
about what GCSEs we
need for which jobs’
‘They tell us what the
job involves but not how
to get the job and how
they did’
‘Assuming because I’m
academic I’m going to go
to University’
‘They talk about
themselves without
advising or helping
me’ out advising or
helping me’
Tee
‘They try and role model you
into themselves’
T
‘They don’t have
attractive posters’
‘They can be very boring’
‘We need to know how
to access opportunities
to meet people in tech –
teachers should not be
the only gatekeepers’
Events
Awards
Awards
How can you help?
1. Sponsor
2. Run an activity
3. TeenTech Ambassador
4. TeenTech Mentor
Maggie@teentechevent.com
.
Bespoke Commercial
Response Plan
Commercial Coach for
Cyber Attack Response
Cyber Rescue Alliance
Practice your Response
in Executive Simulations
Example Alliance Partners
Security Scorecard to
auto review Suppliers
Cost effective online
Staff Training
SEC-1 to conduct
penetration testing
Join Cyber Rescue
Cyber Rescue is a Membership organisation that helps CEOs lead recovery from cyber attack.
Cyber Rescue operates in 9 countries across Europe, helping leaders protect reputation and
revenues when hackers break through. Membership costs £10,000 per year.
Members benefit from Executive Role Plays, bespoke Commercial Response Plans, and
expert Coaching during a catastrophic breach. Cyber Rescue's advisors have led response to
thousands of cyber attacks and hundreds of breaches. The Cyber Rescue team have
expertise the many functional areas that are impacted by a successful cyber attack, for
example Legal, PR, HR, Operations, Finance and Customer Service, as well as IT Forensics
and Remediation.
+44 (0)20 7859 4320
www.linkedin.com/company/cyber-rescue-alliance

More Related Content

What's hot

Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
centralohioissa
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
Tripwire
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
Agus Wicaksono
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
Andy Kim
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
Sania Baker
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
Reading Works Detroit
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
Vishvendra Saini
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
Erin Planting
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
IT-oLogy
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
Ramón Gómez de Olea y Bustinza
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
Welch LLP
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBooz Allen Hamilton
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium
 
ATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidents
bcilondonforum
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFox
ZoneFox
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec
 

What's hot (18)

Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your MindBrian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
Brian Henger - Psychological Warfare: How Cyber Criminals Mess With Your Mind
 
How to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security LiteracyHow to Improve Your Board’s Cyber Security Literacy
How to Improve Your Board’s Cyber Security Literacy
 
Building Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital EconomyBuilding Cyber Resilience in the Digital Economy
Building Cyber Resilience in the Digital Economy
 
Cybersecurity seminar brochure
Cybersecurity seminar brochureCybersecurity seminar brochure
Cybersecurity seminar brochure
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Cybersecurity Service Provider
Cybersecurity Service ProviderCybersecurity Service Provider
Cybersecurity Service Provider
 
Cybersecurity Solutions
Cybersecurity SolutionsCybersecurity Solutions
Cybersecurity Solutions
 
National Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael KaiserNational Cyber Security Awareness Month - Michael Kaiser
National Cyber Security Awareness Month - Michael Kaiser
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
Cyber Security Planning 101
Cyber Security Planning 101Cyber Security Planning 101
Cyber Security Planning 101
 
HackersAttackersCriminals_2014
HackersAttackersCriminals_2014HackersAttackersCriminals_2014
HackersAttackersCriminals_2014
 
Building the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for SuccessBuilding the Next Generation ISAC-- A Blueprint for Success
Building the Next Generation ISAC-- A Blueprint for Success
 
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
FinTech Belgium – Fintech Belgium MeetUp on Cybersecurity – F.Lecocq – Digitr...
 
ATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidentsATOS: Preparing your business to manage cyber incidents
ATOS: Preparing your business to manage cyber incidents
 
The Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFoxThe Modern Business Has No Perimeter - ZoneFox
The Modern Business Has No Perimeter - ZoneFox
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 

Viewers also liked

Bivariate measurement data
Bivariate measurement dataBivariate measurement data
Bivariate measurement dataGeosha5569
 
Presentation @11/09/2015 V4.1
Presentation @11/09/2015 V4.1Presentation @11/09/2015 V4.1
Presentation @11/09/2015 V4.1
Michael Leung
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
Robert Stones
 
Power point etm
Power point etmPower point etm
Power point etm
Sutan28
 
відповіді на тест 3
відповіді на тест 3відповіді на тест 3
відповіді на тест 3
atmanant
 
Tony Precision Company Profile
Tony Precision Company ProfileTony Precision Company Profile
Tony Precision Company Profile
dennygraph
 
ascaris lumbricoids
ascaris lumbricoidsascaris lumbricoids
ascaris lumbricoids
iyumva aimable
 
Estudo 15 11 - aspectos importantes da oração bem sucedida
Estudo 15  11 - aspectos importantes da oração bem sucedidaEstudo 15  11 - aspectos importantes da oração bem sucedida
Estudo 15 11 - aspectos importantes da oração bem sucedida
Jaed Gomes
 
50 years of K.V.Fort William by Pratima Nayak
50 years of K.V.Fort William by Pratima Nayak50 years of K.V.Fort William by Pratima Nayak
50 years of K.V.Fort William by Pratima Nayak
Pratima Nayak ,Kendriya Vidyalaya Sangathan
 

Viewers also liked (13)

Bivariate measurement data
Bivariate measurement dataBivariate measurement data
Bivariate measurement data
 
Presentation @11/09/2015 V4.1
Presentation @11/09/2015 V4.1Presentation @11/09/2015 V4.1
Presentation @11/09/2015 V4.1
 
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 InfographicIS Know How - Third Sector Cyber Security Survey 2015 Infographic
IS Know How - Third Sector Cyber Security Survey 2015 Infographic
 
NCOER 2008-1
NCOER 2008-1NCOER 2008-1
NCOER 2008-1
 
Power point etm
Power point etmPower point etm
Power point etm
 
Red inalámbrica
Red inalámbricaRed inalámbrica
Red inalámbrica
 
Catia_V5_En
Catia_V5_EnCatia_V5_En
Catia_V5_En
 
відповіді на тест 3
відповіді на тест 3відповіді на тест 3
відповіді на тест 3
 
Tony Precision Company Profile
Tony Precision Company ProfileTony Precision Company Profile
Tony Precision Company Profile
 
Recurso (4
Recurso (4Recurso (4
Recurso (4
 
ascaris lumbricoids
ascaris lumbricoidsascaris lumbricoids
ascaris lumbricoids
 
Estudo 15 11 - aspectos importantes da oração bem sucedida
Estudo 15  11 - aspectos importantes da oração bem sucedidaEstudo 15  11 - aspectos importantes da oração bem sucedida
Estudo 15 11 - aspectos importantes da oração bem sucedida
 
50 years of K.V.Fort William by Pratima Nayak
50 years of K.V.Fort William by Pratima Nayak50 years of K.V.Fort William by Pratima Nayak
50 years of K.V.Fort William by Pratima Nayak
 

Similar to Cyber Heroes of tomorrow's world

Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Cammy Bean
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
infosec train
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
Rick Morgan
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Falgun Rathod
 
Essay About Edsa Revolution 1986 Tagalog
Essay About Edsa Revolution 1986 TagalogEssay About Edsa Revolution 1986 Tagalog
Essay About Edsa Revolution 1986 Tagalog
Kayleigh Fournier
 
Data Science and Artificial Intelligence course offered by Securium Academy ...
Data Science and Artificial Intelligence  course offered by Securium Academy ...Data Science and Artificial Intelligence  course offered by Securium Academy ...
Data Science and Artificial Intelligence course offered by Securium Academy ...
Securium Academy
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
FRSecure
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
William McBorrough
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
TIKAJ
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
ITSM Academy, Inc.
 
master class.pdf
master class.pdfmaster class.pdf
master class.pdf
Kumar0800
 
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
Simon Thompson
 
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
Intead - International Education Advantage, LLC
 
Advancing Your Cybersecurity Career
Advancing Your Cybersecurity CareerAdvancing Your Cybersecurity Career
Advancing Your Cybersecurity Career
Keyaan Williams
 
Security social selling e book2
Security social selling e book2Security social selling e book2
Security social selling e book2
NeuronLeaders
 
5 ways to liven up your corporate training
5 ways to liven up your corporate training5 ways to liven up your corporate training
5 ways to liven up your corporate training
BankersLab
 
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdfWebinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
Rohan Ray
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
Rosa Williams
 
Integrated Digital Marketing for Universities: ICEF Miami 2013 presentation ...
Integrated Digital Marketing for Universities:  ICEF Miami 2013 presentation ...Integrated Digital Marketing for Universities:  ICEF Miami 2013 presentation ...
Integrated Digital Marketing for Universities: ICEF Miami 2013 presentation ...
Michael Waxman-Lenz
 
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take ChargeNazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
CIO Look Magazine
 

Similar to Cyber Heroes of tomorrow's world (20)

Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearnDesigning Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
Designing Learning Solutions for Results (Cammy Bean & Ashley Reardon) #DevLearn
 
CISO Interview Question.pdf
CISO Interview Question.pdfCISO Interview Question.pdf
CISO Interview Question.pdf
 
From Apps To Tweets Insurance Agents and the Social Web 040310
From Apps To Tweets  Insurance Agents and the Social Web 040310From Apps To Tweets  Insurance Agents and the Social Web 040310
From Apps To Tweets Insurance Agents and the Social Web 040310
 
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
Cyber Octet Private Limited - Ethical Hacking & Cyber Security Training and S...
 
Essay About Edsa Revolution 1986 Tagalog
Essay About Edsa Revolution 1986 TagalogEssay About Edsa Revolution 1986 Tagalog
Essay About Edsa Revolution 1986 Tagalog
 
Data Science and Artificial Intelligence course offered by Securium Academy ...
Data Science and Artificial Intelligence  course offered by Securium Academy ...Data Science and Artificial Intelligence  course offered by Securium Academy ...
Data Science and Artificial Intelligence course offered by Securium Academy ...
 
2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One2019 FRSecure CISSP Mentor Program: Class One
2019 FRSecure CISSP Mentor Program: Class One
 
MCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk ManagementMCG Cybersecurity Webinar Series - Risk Management
MCG Cybersecurity Webinar Series - Risk Management
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015Cyber resilience itsm academy_april2015
Cyber resilience itsm academy_april2015
 
master class.pdf
master class.pdfmaster class.pdf
master class.pdf
 
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
Lessons from Learning: How to make an intranet more useful (Simon Thompson/In...
 
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
Integrated Digital Marketing for Universities: ICEF Miami 2013 Presentation S...
 
Advancing Your Cybersecurity Career
Advancing Your Cybersecurity CareerAdvancing Your Cybersecurity Career
Advancing Your Cybersecurity Career
 
Security social selling e book2
Security social selling e book2Security social selling e book2
Security social selling e book2
 
5 ways to liven up your corporate training
5 ways to liven up your corporate training5 ways to liven up your corporate training
5 ways to liven up your corporate training
 
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdfWebinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
Webinar_Slide_Deck__Finding_Transformation_Opportunities_With_Generative_AI.pdf
 
Soal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 SdSoal Essay Ipa Kelas 4 Sd
Soal Essay Ipa Kelas 4 Sd
 
Integrated Digital Marketing for Universities: ICEF Miami 2013 presentation ...
Integrated Digital Marketing for Universities:  ICEF Miami 2013 presentation ...Integrated Digital Marketing for Universities:  ICEF Miami 2013 presentation ...
Integrated Digital Marketing for Universities: ICEF Miami 2013 presentation ...
 
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take ChargeNazanine Matin: Encouraging Women Entrepreneurs to Take Charge
Nazanine Matin: Encouraging Women Entrepreneurs to Take Charge
 

More from Kevin Duffey

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
Kevin Duffey
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
Kevin Duffey
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
Kevin Duffey
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
Kevin Duffey
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
Kevin Duffey
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Kevin Duffey
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
Kevin Duffey
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
Kevin Duffey
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
Kevin Duffey
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
Kevin Duffey
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
Kevin Duffey
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Kevin Duffey
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Kevin Duffey
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
Kevin Duffey
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
Kevin Duffey
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
Kevin Duffey
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Kevin Duffey
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Kevin Duffey
 

More from Kevin Duffey (20)

Cyber Insights from 100 surveys
Cyber Insights from 100 surveysCyber Insights from 100 surveys
Cyber Insights from 100 surveys
 
Cyber TPRM - the journey ahead
Cyber TPRM - the journey aheadCyber TPRM - the journey ahead
Cyber TPRM - the journey ahead
 
Ensuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance SectorEnsuring Cyber Resilience in the Finance Sector
Ensuring Cyber Resilience in the Finance Sector
 
Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022Breaches Anticipated in 2022 - November 1st, 2022
Breaches Anticipated in 2022 - November 1st, 2022
 
Best Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveysBest Cyber Insights of 2022, from over 200 surveys
Best Cyber Insights of 2022, from over 200 surveys
 
Breaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so LowBreaches Anticipated in 2022 as Cyber Security Posture so Low
Breaches Anticipated in 2022 as Cyber Security Posture so Low
 
Cyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptxCyber Insurance - Best Insights of June 2022.pptx
Cyber Insurance - Best Insights of June 2022.pptx
 
Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022Best Cyber Risk Insights from 100 reports published in year to March 2022
Best Cyber Risk Insights from 100 reports published in year to March 2022
 
Breaches Anticipated - because firms have weak cyber security visible to hac...
Breaches Anticipated  - because firms have weak cyber security visible to hac...Breaches Anticipated  - because firms have weak cyber security visible to hac...
Breaches Anticipated - because firms have weak cyber security visible to hac...
 
Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022Cyber insurance insights - 17th feb 2022
Cyber insurance insights - 17th feb 2022
 
Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021Breaches anticipated in 2021 - Published 14th Jjune 2021
Breaches anticipated in 2021 - Published 14th Jjune 2021
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
 
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
 
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019
 
Cyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and SuppliersCyber Resilience across Subsidiaries and Suppliers
Cyber Resilience across Subsidiaries and Suppliers
 
London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018London First - cyber attack simulation - 22nd May 2018
London First - cyber attack simulation - 22nd May 2018
 
Cyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 ExecutivesCyber Attack Simulation for 450 Executives
Cyber Attack Simulation for 450 Executives
 
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
Equifax Breach - Lessons - Cyber Rescue - 16th may 2018
 
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...
 

Recently uploaded

What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
European Service Center
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
jennifermiller8137
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
Excavator
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
amvovau
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
kshamashah95
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
Tanner Motors
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
coc7987515756
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Hyundai Motor Group
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
Excavator
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Masters European & Gapanese Auto Repair
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Precious Mvulane CA (SA),RA
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
Antique Plastic Traders
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
psavhef
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Vic Auto Collision & Repair
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
Dart Auto
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
4thzenzstar
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
Bertini's German Motors
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
Autohaus Service and Sales
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
Motor Cars International
 

Recently uploaded (19)

What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
What Causes 'Trans Failsafe Prog' to Trigger in BMW X5
 
Things to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your carThings to remember while upgrading the brakes of your car
Things to remember while upgrading the brakes of your car
 
Ec330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdfEc330B Lc Excavator Volvo Service Repair.pdf
Ec330B Lc Excavator Volvo Service Repair.pdf
 
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
一比一原版BC毕业证波士顿学院毕业证成绩单如何办理
 
Tyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEATTyre Industrymarket overview with examples of CEAT
Tyre Industrymarket overview with examples of CEAT
 
What Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMWWhat Does the Active Steering Malfunction Warning Mean for Your BMW
What Does the Active Steering Malfunction Warning Mean for Your BMW
 
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptxStatistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
Statistics5,c.xz,c.;c.;d.c;d;ssssss.pptx
 
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'Core technology of Hyundai Motor Group's EV platform 'E-GMP'
Core technology of Hyundai Motor Group's EV platform 'E-GMP'
 
Ec460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdfEc460b lc Excavator Volvo Service Repair.pdf
Ec460b lc Excavator Volvo Service Repair.pdf
 
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out HereWhy Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
Why Isn't Your BMW X5's Comfort Access Functioning Properly Find Out Here
 
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs  Consulting SMEs.pptxEmpowering Limpopo Entrepreneurs  Consulting SMEs.pptx
Empowering Limpopo Entrepreneurs Consulting SMEs.pptx
 
Antique Plastic Traders Company Profile
Antique Plastic Traders Company ProfileAntique Plastic Traders Company Profile
Antique Plastic Traders Company Profile
 
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
一比一原版SDSU毕业证圣地亚哥州立大学毕业证成绩单如何办理
 
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to TellWondering if Your Mercedes EIS is at Fault Here’s How to Tell
Wondering if Your Mercedes EIS is at Fault Here’s How to Tell
 
Why Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release CommandsWhy Is Your BMW X3 Hood Not Responding To Release Commands
Why Is Your BMW X3 Hood Not Responding To Release Commands
 
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtycccccccccccccccccccccccccccccccccccccccccccccccccccccccgtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
gtyccccccccccccccccccccccccccccccccccccccccccccccccccccccc
 
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
5 Warning Signs Your BMW's Intelligent Battery Sensor Needs Attention
 
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
What Does the PARKTRONIC Inoperative, See Owner's Manual Message Mean for You...
 
What Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It WorkWhat Exactly Is The Common Rail Direct Injection System & How Does It Work
What Exactly Is The Common Rail Direct Injection System & How Does It Work
 

Cyber Heroes of tomorrow's world

  • 1. Cyber heroes of tomorrow’s world Recovery from Cyber Attack October 2016 www.linkedin.com/company/cyber-rescue-alliance
  • 2. First presented in Oct 2016. For other presentations at this event www.linkedin.com/company/cyber-rescue-alliance
  • 3. Cyber Heroes Maggie Philbin TeenTech How CEOs can find heroes for tomorrow’s world
  • 7. Cyber Security – The film ‘”T“Thank you for a brilliant day. This was the first time my daughter has understood where she might use her love of Physics and Maths”
  • 8. What qualities do I need? 1. Creativity 2. Willingness to learn new things 3. Adaptability 4. Bold thinking 5. Ability to collaborate 6. Ability to strategise 7. Curiosity
  • 9. ‘They talk about ‘ without advising or ‘They give the same advice to everyone when we are all different in our ways’ ‘We need to know more about what GCSEs we need for which jobs’ ‘They tell us what the job involves but not how to get the job and how they did’ ‘Assuming because I’m academic I’m going to go to University’ ‘They talk about themselves without advising or helping me’ out advising or helping me’ Tee ‘They try and role model you into themselves’ T ‘They don’t have attractive posters’ ‘They can be very boring’ ‘We need to know how to access opportunities to meet people in tech – teachers should not be the only gatekeepers’
  • 13. How can you help? 1. Sponsor 2. Run an activity 3. TeenTech Ambassador 4. TeenTech Mentor Maggie@teentechevent.com .
  • 14. Bespoke Commercial Response Plan Commercial Coach for Cyber Attack Response Cyber Rescue Alliance Practice your Response in Executive Simulations
  • 15. Example Alliance Partners Security Scorecard to auto review Suppliers Cost effective online Staff Training SEC-1 to conduct penetration testing
  • 16. Join Cyber Rescue Cyber Rescue is a Membership organisation that helps CEOs lead recovery from cyber attack. Cyber Rescue operates in 9 countries across Europe, helping leaders protect reputation and revenues when hackers break through. Membership costs £10,000 per year. Members benefit from Executive Role Plays, bespoke Commercial Response Plans, and expert Coaching during a catastrophic breach. Cyber Rescue's advisors have led response to thousands of cyber attacks and hundreds of breaches. The Cyber Rescue team have expertise the many functional areas that are impacted by a successful cyber attack, for example Legal, PR, HR, Operations, Finance and Customer Service, as well as IT Forensics and Remediation. +44 (0)20 7859 4320 www.linkedin.com/company/cyber-rescue-alliance

Editor's Notes

  1. Welcome, to CEOs leading Recovery from Cyber Attack.
  2. Welcome, to CEOs leading Recovery from Cyber Attack.
  3. In 2016 A team of young people from different schools and colleges came to the Digital Catapult in London to explore careers in cyber security with leading companies in the sector …
  4. In 2016 A team of young people from different schools and colleges came to the Digital Catapult in London to explore careers in cyber security with leading companies in the sector …
  5. In 2016 A team of young people from different schools and colleges came to the Digital Catapult in London to explore careers in cyber security with leading companies in the sector …
  6. Resources for teachers and librarians to lead