Most large businesses have already incorporated cyber risk management into their business strategy because there is a broader awareness of the need for holistic and thoughtful protection from cyber threats. However, unlike large businesses, small and medium-sized enterprises (SMEs) generally do not regard cyber risk as a strategic component in their business model despite the fact that cyber risk for SMEs is a real and growing phenomenon. However, SMEs need to Ready for Cyber Battle. Cyber crime is now very much part of interconnected global risks, with attacks against all businesses almost doubling in the last five years. Most worrying of all, statistics show that between 60 percent and 70 percent of SMEs are unable to survive a breach and are out of business within six months – all because they have no supplemental support mechanism in place to help them rebuild the company and reinstate their operations. (Source: Insurance Journal)
Due to the new General Regulation of Data Protection (GDPR) of the European Union, organizations are prioritizing this cyber risk in their corporate agenda. Considering that nowadays only 16% of the market value of S&P 500 companies is in physical assets and the rest comes from intangibles, it’s easy to understand why cyber risk management has become a priority issue.
In this webinar we will analyze the main barriers for SMEs to manage cyber risk and we will go through some key aspects to be taken into account in cyber risk management.
The webinar is open to all interested in the cybersecurity landscape, especially those concerned with cyber risk management.
"Small and medium-sized enterprises (SMEs) are the new target for cyberattacks. In this webinar, we look at lightweight ways that allow SMEs to protect themselves thoroughly. The participant will receive food for thought, a checklist, and an invitation to the SMESEC beta programme."
"Consistency of an interpretation of Risk is far more important than how brilliant that interpretation is - keep it simple!"
"When comparing those attacked firms from our sample, to their non-attacked counterparts, the loss of value in their intangibles is roughtly around 20%. Furthermore, the simulated cascading effect for critical sectors is expressed into billions of euros, whereas the overall insurance market is less than 4Bns worldwide".
John Davies is the Co-founder and Chair of Cyber Wales, the largest cyber security ecosystem in the UK. John has also chaired the Wales Cyber Resilience Board, a Welsh Government Steering Committee working with the National Cyber Security Centre to enhance cyber resilience across Welsh Public Sector organisations and providing policy and best practice advice for the Private Sector. John has been a Sessional Lecturer on MBA courses and is committed to helping to close the skills gap in cyber security by participating on the Curriculum Advisory Boards of both Cardiff University and the University of South Wales where he regularly runs sessions for the National Cyber Security Academy. John is a Welsh speaker who plays an active role helping military personnel and their families as Chairman of the Regional Employer Engagement Group for Wales. For his day-job, he runs a Cardiff-based cyber security software vendor.
Chair professor with a specialisation in the measurement of intangibles of firms and sectors. Scientific coordinator of the Hermeneut project
Aitor Couce is a PhD student at Universidad Rey Juan Carlos, working on a decision support model for analysing the risk of cybersecurity incidents. He is BSc in Economics (Universidade de Santiago de Compostela, 2008) and MSc in Decision Engineering (Universidad Rey Juan Carlos, 2012). He has worked as cybersecurity analyst (2013-17) at Secure-NOK, Norway, doing risk analysis, research and innovation activities and supporting the development and marketing of cybersecurity software. All of these was done for commercial and R&D projects in Europe and USA. He also worked as an administrative officer at Flue, Spain (2009-10).
Ioannis Kechaoglou is a cybersecurity engineer at RHEA Group with a strong academic background and practical experience. In his current role, he is involved in cybersecurity training and projects. As part of his effort to improve upon his skills, he likes to challenge himself participating in innovative projects in the cyber domain with the most recent the CYBERWISER.eu, an authoritative, independent cyber range platform for professional training.
Degree in Pedagogy from the University of Málaga. Trainer of trainers by the Forem Institute. Editor in the reputed cybersecurity news blog "Una Al Día". Oriented to the academic and formative part in youth and currently focused on the digital world and cybersecurity.
Samuel Fricker, Ph.D., is a professor at the University of Applied Sciences Northwestern Switzerland (FHNW). Samuel is heading a team of researchers and developers with in-depth experience of cybersecurity in the Swiss digital infrastructure and banks. Samuel knows SMEs from the inside out as he has worked in SMEs and created multiple startups in his career. In the SMESEC project, Samuel and his team are researching the adoption of good cyber security practice for SME and adherence to these practices. Samuel's team embeds the knowledge in the digital Cybersecurity Coach, a component of the SMESEC framework, that helps SMEs to discover cybersecurity needs and implement lightweight actions for thorough protection.
Head Business and ICT Consultant and project manager. Telecommunications Engineering from the University of Malaga, with over 15 years experience in business and strategic consultancy for public administrations and SMEs. At CITIC; Marina develops strategic plans for innovation and information society, ICT and business advice to SMEs, development of commercial offers, attracting companies for participation in R + D + i projects. Reports, market research, analysis, project management.
Nicholas Ferguson, Digital Communications Strategist & Project Manager. Nicholas has an MSc in Educational Management and a BA Hons in Politics and Sociology. He is the coordinator of the Common Dissemination Booster (CDB) as well as the coordinator of cyberwatching.eu. Previously, he was the coordinator of the CloudWATCH2 project and deputy coordinator of CloudWATCH, SLA-Ready, SIENA and OGF-Europe. He excels in building & promoting innovative tools and services in the ICT innovation landscape. His work focuses on raising awareness of novel tools and services in ICT, in the private, especially SMEs and public sectors as well as providing contributions to the adoption of ICT Standards. Since its launch in 2009, Nicholas managed the Cloudscape Series, www.cloudscapeseries.eu that grew from a funded initiative by the EC to becoming a self-sustaining event attracting international thought leaders in the cloud space in Europe. Nicholas has also played an instrumental role in the evolution of the yearly concertation meetings of the CloudWATCH & CloudWATCH2 projects.
Tendons behave as springs transmitting forces of muscle to bone and still provide stability and efficiency. Definition#4) Electric Potential: The capacity of an electric field to do develop an electric charge, which is typically measured in volts. It is regarded as a hazardous material and it has a standing of being a technique of rendering someone unconscious, enabling you to definitely kidnap someone who it is used on.
Working at the local pharmacy chain has taught me that insurance providers do not particularly desire to pay for the patient's medication along with their knowledgeable computer may decide that you need prior approval for prescription coverage of the medication. He declared most people tolerate one experience a drug before exhibiting symptoms like mine around the second and even later exposure. In addition, people who are less than forty years of age or who are immunosuppressed may benefit from elective surgery to prevent future instances of diverticulitis.
The study noted that since yet, there have been no controlled studies determining whether one medical procedure is a lot better than another. As I show my patients with seemingly low blood glucose symptoms, we all can possess a kind of mild to moderate, garden variety hypoglycemia where our blood sugar levels falls a bit too low now and then. It was during the twentieth century that resulted in the introduction of several successful vaccines, some of those vaccines against measles, mumps, rubella, and diphtheria.
I'm still taking Neurontin, that the dosage has been changed several times. The negative effects of TBI are severe and may range coming from a coma or death to cognitive disorders to social and behavioral issues to mental and physical disability. A friend told me about utilizing a water spraying teeth cleaning machine for sinus irrigation years back and I finally completed it February of 2010 with excellent results.
Neurontin didn't cause me to so sick to my stomach like Lyrica did. When a urinary tract infection gets unmanageable and home remedies, like cranberry juice and drinking fluids don't seem to aid, doctors use their own kind of treatment to kill chlamydia. Also, since tendon and fascia fibers don't slide along one another the way muscle fibers do, the hypothesis is the collagen fibers somehow become intertwined, developing what might be pictured as "crosshatches" of collagen. Taking any medication and drinking alcohol can cause serious negative effects.
Join the HSbooster.eu Training Academy's 4th online session on 7 December 2023, at 10:00 CET, as it delves into the intricate realm of Conformity Assessment Schemes and Systems.