10 Essential Cyber Security Controls for Increased Resilience and Better Insurance Coverage November 4, 2021 Webcast

or to bookmark this page

Click here to bookmark this page

Click here to remove bookmark

While threat actors continue to vary attack methods, these 10 essential cyber security controls can significantly improve your security posture, therefore making it harder for cybercriminals to compromise your network and increasing your opportunities for cyber insurance coverage. Validated by our seasoned cyber security experts based on frontline expertise and with a thorough review of the expanded questionnaires now requested by most cyber insurance carriers, this session will present key takeaways for each of the controls and their real-life effectiveness.

Schedule: 12:30 p.m. – 1:30 p.m. (ET)

Key Takeaways

  • Why are these 10 controls essential?
  • What types of attacks can these 10 security controls help mitigate?
  • How are cyber criminals leveraging weaknesses in the 10 essential controls to deploy ransomware?
  • Real life case studies of incidents against organizations with weak essential controls and how they compare against more resilient organizations
  • What cyber insurance carriers are looking for in order to underwrite or renew policies
 

Speakers

  • Mari DeGrazia, Associate Managing Director, Cyber Risk, Kroll
  • Elizabeth Dill, Partner, Mullen Coughlin
  • Jeff Macko, Associate Managing Director, Cyber Risk, Kroll
  • Peter McKeever, Assistant VP, US & Canada Cyber Practice, Marsh
2021-11-04T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2021/featured-images/10-essential-cyber-security-controls.jpg /en/insights/events/2021/webcast-10-essential-cyber-security-controls event {EF1B7ABE-2357-44B0-BBE4-F8D4CDA62BAC} {E39587AD-8F0B-4FE2-865F-969BC5501096} {7A48DD95-1A63-4784-842F-A2BE81EAFE13} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130} {7EBB89F8-B33F-4513-8666-35B311DE3778} {34183564-0FD0-4B23-83DD-F39E7A73B28B} {2DEEE4D2-8278-4C50-B3FF-1563BB257804}
Register Now

This field is required
This field is required
This field is required
This field is required
This field is required A valid email address is required
Please select an Option
This field is required
This field is required
We will use this information to respond to your inquiry and process your data in accordance with our privacy policy.

Contact Us

Other Areas We Can Help

Canadian Data Breach | Cyber Risk | Kroll

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments
Cyber Risk

Cyber Risk

Global, end-to-end cyber risk solutions.

Cyber Risk
Kroll Nominated in Two Categories at the Advisen Cyber Risk Awards

Computer Forensics

Expert computer forensic assistance at any stage of a digital investigation or litigation.

Computer Forensics
Incident Response and Litigation Support

24x7 Incident Response

Compliant notifications, reputation-saving remediation, and litigation support.

24x7 Incident Response
Cyber Risk Retainers

Cyber Risk Retainers

Secure a true cyber risk retainer with elite digital forensics and incident response capabilities.

Cyber Risk Retainers
Managed Security Services

Managed Security Services

Managed security services to augment security operations centres and incident response capabilities.

Managed Security Services
Cyber Risk: The New Due Diligence Frontier, Identity Monitoring

Data Breach Notification Letters

Notification letters personalized by industry including healthcare, financial, legal and others.

Data Breach Notification Letters

Insights

Cyber

Initial Access Brokers: Fueling the Ransomware Threat  - The Monitor, Issue 17

Cyber
Cyber

Case Study – Spearphishing Compromises Fuel Chain Credit Card Transactions, Ends in Ransomware

Cyber
Cyber

The State of Incident Response

Cyber
Cyber

2021 Data Breach Outlook – “Under-attacked” Industries Feel the Heat 

Cyber

Events

The Sovereign Investor’s Guide to Investing in Real Assets

Calendar

Location