Cybersecurity - You have been breached! Now what?

Events

Video

Cybersecurity - You have been breached! Now what?

Speaker: Steven Ursillo, CPA, CISSP, CISA

  • Format

    Video

  • Level

    Basic

  • Duration

    PST2028

This session will discuss continued and emerging governance expectations from leadership and the techniques used to promote effective incident response strategies.

Learning outcomes

  • This video discusses continued and emerging governance expectations from leadership and the techniques used to promote effective incident response strategies.

£35.00 (CIMA members only)

£45.00

VAT calculated on checkout

Product information

Overview

As new cybersecurity threats continue to emerge, the ongoing challenges around proper detection, response and recovery remain a dynamic obstacle for organizational leadership, management and technical teams. Organizational success is driven by its leaders and the culture they promote proactively assuming that a breach is almost certain.

Professional development

All learning resources available in the CGMA Store qualify for CPD for CIMA members.

Prerequisites:1-2 Years in the Profession
Programme level:Basic
Duration:PST2028
Format:Video
Access:This is a digital product. You will have access to the content for a year after purchase date.

Return and refund policy

£35.00 (CIMA members only)

£45.00

VAT calculated on checkout

Speaker

  • Steven Ursillo, CPA, CISSP, CISA

    Leadership Role: National Leader, Information Assurance & Cybersecurity

    Education: Bachelor of Science in Business Administration, Bryant University; Masters of Computer Information Science, Boston University

    Designations: CPA, CISA, CISSP, CCSFP

    Steve serves as Cherry Bekaert's National Leader for the Information Assurance & Cybersecurity practice. He specializes in risk management, internal control over financial reporting, information system security, privacy, cyber fraud prevention and detection, security and privacy governance, and IT assurance services. With more than 20 years of experience, Steve provides a variety of IT audit and security services for his clients across multiple industries.

    His background and knowledge with risk assurance and advisory engagements include information security readiness, cybersecurity, security and privacy attestation services, third-party assurance including HITRUST, cyber risk assessments, vendor risk assessments, disaster recover reviews, privacy reviews, System and Organization Control (SOC) reporting including SOC 1, 2 & 3, as well as other types of attestations and readiness assessments. In the area of information security, Steve's experience ranges from security consulting and implementation to security assessments involving network and attack and penetration testing. Steve is a nationally recognized writer and speaker on issues in the forefront of cybersecurity, risk and technology publications. He has delivered numerous presentations for various professional organizations and the public. In addition, Steve has provided end-user security awareness training to several clients' staff, managers, directors, board members and to the general public. He has also performed live hacking demonstrations on simulation systems including network, wireless, mobile, application and web application attacks.