Using CIE to determine coverage limits
The Wonderful Lloyd's Old Library

Using CIE to determine coverage limits

It was a pleasure to present at the Intech Forum 'How to boost resilience amid increasing threats' at the Lloyd's Old Library yesterday.

As NCSC Assured Service Providers for Cyber Incident Exercising (CIE), I explained how our CyberSimulate CIEs can help the process for determining appropriate policy coverage limits. More on why this is of importance here.

Analysis of limits is just one of numerous benefits from undertaking CIEs and helping organisations prepare for managing cyber incidents when they occur.

CIEs are increasingly becoming a requirement for many regulators and are recommended and endorsed by reputable cyber insurers.

More on on our CyberSimulate CIEs here.

Many thanks to our partners Northdoor, to our host, Brian Groves, the forum chair, Jerry Adley and my co-presenters, Dov Goldman from Panorays and Mark Shaw from Rubrik.

Hani B.

Cybersecurity Advisor/Coach

10 个月

Great event yesterday at Lloyds of London Neil Hare-Brown

回复
Jonathan Ellwood

Head of Cyber Incident Exercising and Response | Head of Assure Schemes | Neurodiversity Champion | Visiting Fellow University of Gloucestershire

10 个月

Great stuff Neil H. ! Hope to see you in person soon.

回复

要查看或添加评论,请登录

Neil Hare-Brown的更多文章

  • Separation of Duties in Cyber

    Separation of Duties in Cyber

    For those in the cyber security profession who have experience of fraud investigations and fraud prevention, the…

    9 条评论
  • Callin' It Out: Fear, Uncertainty & Doubt

    Callin' It Out: Fear, Uncertainty & Doubt

    After 40 years in cyber, one thing has not changed since the days of the first anti-virus product vendors (now EDR…

    1 条评论
  • Conflicts of Interest in Managed Security Services Providers: Monitoring Networks and Responding to Incidents

    Conflicts of Interest in Managed Security Services Providers: Monitoring Networks and Responding to Incidents

    In the world of cybersecurity, Managed Security Services Providers (MSSPs) play a critical role in safeguarding…

    5 条评论
  • Volatile Cyber Risk Assessment

    Volatile Cyber Risk Assessment

    After forty years assessing cyber risk it is clear that we are doing it wrong! This article is not about risk…

  • Conflicts of Interest in Cyber

    Conflicts of Interest in Cyber

    In several aspects of society and business we recognise the need for a separation of duties to ensure integrity and…

    5 条评论
  • Controls Degradation

    Controls Degradation

    After a 40 year career in cyber risk management, I have had the privilege to work with a range of professionals…

  • STORM in the IASME Pavilion

    STORM in the IASME Pavilion

    As an NCSC Assured Service Provider for CIE and CIR L2, we will be discussing and presenting what good Cyber Incident…

    1 条评论
  • Analysing Ransomware Transcripts

    Analysing Ransomware Transcripts

    The Royal Mail International ransomware incident was reasonably high profile, and, as well as the breached dataset, the…

    1 条评论
  • When is evidence not evidence? When it is referenced in a breach notification.

    When is evidence not evidence? When it is referenced in a breach notification.

    There have been numerous cyber incidents which have required press releases and notifications to regulators and data…

    2 条评论
  • Cyber Silver Bullet #2: Ransomware

    Cyber Silver Bullet #2: Ransomware

    This is the second of my CSB articles. I had some great feedback from CSB #1 on Business Email Compromise (BEC) so I…

    4 条评论

社区洞察

其他会员也浏览了