13:30

  • Establishing your threat base line
  • Evaluating your readiness posture
  • Review of all systems, firewalls, anti-virus etc.
  • The need for regular cyber audit check-ups
  • What should be on the cyber audit check-list?
  • What haven’t you done?
  • Where do you stand on the readiness spectrum in each area?
  • Updating your cyber security policy to mitigate risk if and when disaster strikes
  • Training and testing – what training sticks and what needs work
  • Desktop exercises
  • Intersection of privacy and security in breach reporting as a preparedness exercise