10 Essential Cyber Security Controls for Increased Resilience and Better Insurance Coverage November 4, 2021 Webcast

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

While threat actors continue to vary attack methods, these 10 essential cyber security controls can significantly improve your security posture, therefore making it harder for cybercriminals to compromise your network and increasing your opportunities for cyber insurance coverage. Validated by our seasoned cyber security experts based on frontline expertise and with a thorough review of the expanded questionnaires now requested by most cyber insurance carriers, this session will present key takeaways for each of the controls and their real-life effectiveness.

Schedule: 12:30 p.m. – 1:30 p.m. (ET)

Key Takeaways

  • Why are these 10 controls essential?
  • What types of attacks can these 10 security controls help mitigate?
  • How are cyber criminals leveraging weaknesses in the 10 essential controls to deploy ransomware?
  • Real life case studies of incidents against organizations with weak essential controls and how they compare against more resilient organizations
  • What cyber insurance carriers are looking for in order to underwrite or renew policies
 

Speakers

  • Mari DeGrazia, Associate Managing Director, Cyber Risk, Kroll
  • Elizabeth Dill, Partner, Mullen Coughlin
  • Jeff Macko, Associate Managing Director, Cyber Risk, Kroll
  • Peter McKeever, Assistant VP, US & Canada Cyber Practice, Marsh
2021-11-04T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2021/featured-images/10-essential-cyber-security-controls.jpg /en-ca/insights/events/2021/webcast-10-essential-cyber-security-controls event {EF1B7ABE-2357-44B0-BBE4-F8D4CDA62BAC} {E39587AD-8F0B-4FE2-865F-969BC5501096} {7A48DD95-1A63-4784-842F-A2BE81EAFE13} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130} {7EBB89F8-B33F-4513-8666-35B311DE3778} {34183564-0FD0-4B23-83DD-F39E7A73B28B} {2DEEE4D2-8278-4C50-B3FF-1563BB257804}
Register Now

This field is required
This field is required
This field is required
This field is required
This field is required A valid email address is required
Please select an Option
This field is required
This field is required
We will use this information to respond to your inquiry and process your data in accordance with our privacy policy.

Contact Us

OTHER AREAS WE CAN HELP

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response

Cyber Risk Retainers

Secure a true cyber risk retainer with elite digital forensics and incident response capabilities.

Cyber Risk Retainers
Cyber Risk: The New Due Diligence Frontier, Identity Monitoring

Data Breach Notification

Notification letters personalized by industry including healthcare, financial, legal and others.

Data Breach Notification

Insights

Episode 17

Global Supply Chain Theft Threatens Supply Chain Security: How Corporations Can Prepare and Protect

Episode 17
Compliance

Are Your Disclosures and Compliance Programs SEC Compliant?

Compliance
Compliance

Regulatory Internal Audit Case Studies

Compliance