CYBERSEC 2022 uses cookies to provide you with the best user experience possible. By continuing to use this site, you agree to the terms in our Privacy Policy. I Agree

bg-inner

SESSION

09/22 09:30 - 10:00 ISG Forum

Cyber Risk Quantification, a business focused approach to cyber risk management.

As organizations become more reliant on technology to do business, technology can be a source of strength as well as weakness. Business leaders often make technology decisions and spearheads into developing/acquiring tools to gain competitive advantages, however cyber risk decisions are often not part of that process. As a consequence, cyber related disruptions and losses are often a surprise. If cyber risk decisions are to be made from the top level, it should be presented to the executives as a financial concept rather than a technology concept. The cost of tools and resources are not the reason why process and budget is needed, it is the consequence of business loss that matters. We should take a business focused approach to cyber risk management where loss exposures are defined, risk quantification is estimated in dollars, and risk appetite is more apparent. The success of a cyber risk management program starts at the cyber risk appetite of the senior leadership.

LOCATION Taipei Nangang Exhibition Center, Hall 2 7F 703 LANGUAGE English
SESSION TOPIC Risk ManagementGovernance Risk & ComplianceCyber Risk Quantification

SPEAKER

Anthony Lee
Marsh Asia

Senior Information Technologist (over 20 years) with information security specialties in the financial services and manufacturing industries. Have strong understanding of business objectives and IT processes, and the technical abilities to leverage technology to achieve business competitive advantages.

EXPERIENCE: 

  • A Cyber Security Consultant who help enterprise clients navigate through both management and technical obstacles. Services including SIEM integration, SOC processes and team building, Incident Response management, Cyber risk quantification and management, and OT/ICS and IT security architecture development.  
  • A Information Security Officer provide IT Governance and Security Review services to help mitigate business risks in the Enterprise Risk management practices, covered business units including Fixed-Income, Global Clearing Services, and Equity.
  • A Technology service provider who help small/medium size business with developing custom business applications, process innovation, software programming and system integration.

QUALIFICATIONS:

  • Master Degree in Information System, specialized in Information Security
  • Certified Computer Hacking Forensics Investigator (CHFI)