![]() Your cyber security plan should also contain a chapter on 'change management'. For example, investments in planning and exercises support timely response and recovery actions, thus reducing the impact on service delivery.Ĭyber security is no longer a mere IT issue. They also align with existing incident management methodologies and help demonstrate the impact of cyber security investments. These frameworks help an organisation in its cyber security risk management by organising information, enabling risk management decisions, addressing threats and making improvements by learning from previous activities. To set up such a plan, there are, according to him, sufficient good reference frameworks such as, for example, the NIST framework and, of course, ISO27001. ![]() A proactive and structured approach is therefore crucial. One will not accept that a fire brigade called out to a fire only decides on arrival to invest in appropriate material such as a fire ladder or extinguishing equipment. During his awareness-raising sessions at the hospital, Alain liked to use the analogy of a fire plan. However, the crucial role that IT and cyber security play in this is not self-evident. A hospital and its medical management see their core mission in treating patients. And secondly: the primacy of a cyber security strategy must lie with the business the assessment of the business risks must be the yardstick by which the investment of people and resources in the cyber security plan is decided.Īlain De Maght reported on his 'evangelisation mission' within the hospital. Firstly, that - given the recent explosive evolution in the frequency and intensity of cyberattacks - the core of a cyber strategy should not only lie in avoiding or repelling a cyberattack but in the plan to put the organisation in a position to resume its work after a cyber incident with the least possible disruption. The kick-off of the get-together consists of short personal testimonies of three seasoned CIO/CISOs, namely Philippe Cornette, Head of Security & Systems at John Cockerill, Alain De Maght, CISO and DPO of the IRIS hospital group in Brussels and Cedric Cantillon, DPO & Conseiller en Sécurisation et Gestion des Risques at the RTBF.Īll three speakers are unanimous on two principles. CIONET invites the guests to join three speakers, CIO – DPO - CISO, over dinner to brainstorm how an organisation can proactively and structurally prepare for the worst-case scenario of a cyber attack. ![]() The restaurant's name and its magnificent brick vaults refer to a past as a linen weaving mill in a building purchased by John Cockerill in the first half of the 19 e century and converted to the model of the English early industrial buildings. This CIO gathering takes place at the restaurant 'La Linière' in the quarter of Saint Léonard in Liège. Twenty CIOs and CISOs, turn up in a stylish restaurant in Liège for the first "live" session of 'Les rencontres de CIONET', a series of three events for French-speaking Digital leaders in Belgium and Luxembourg.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |