Managing Cyber Risk Webinar Series

Malicious cyber activity is increasing in frequency, scale, and sophistication. Between 1 July 2019 and 30 June 2020, the Australian Cyber Security Centre (ACSC) responded to an average of 164 cybercrime reports per day… that’s 1 report every 10 minutes.

A risk-based approach to cyber security focuses on key cyber risks as the issue and targeted cybersecurity as the solution. By integrating cyber risk into the overall risk profile of the organisation and demonstrating return on investment, it also helps gain understanding and support from top management.

View our webinars on-demand that cover cyber risk identification, assessment, response, and monitoring. Joined by industry experts, we'll discuss practical insights to show you how risk-based cybersecurity and suitable cybersecurity tools can help you improve the security posture of your organisation.


Program1Image

Managing Cyber Risk: Panel Discussion

Don’t miss this introductory webinar session, where Mark Anderson, Microsoft Australia’s National Security Officer is joined by Katherine Robins, Partner, Cyber Security Services, KPMG and Damien Manuel, Director of Cyber Security, Research & Innovation Centre, Deakin University, and Kenny Singh, Head of Security, Microsoft ANZ, as they discuss ways to:

  • Boost the efficacy of your cybersecurity posture
  • Control your costs while showing clear ROI from your cybersecurity budget
  • Convince management of the business logic and merits of cybersecurity

View on Demand
Program2Image

Risk Identification

In this session, Daniel Goffredo Security Product Manager is joined by Samantha Macleod, Managing Partner, The Security Collective, where they discuss:

  • Identifying key assets in an organization and determining their risk profile
  • Building the high-performing team you need for risk-based cybersecurity
  • People, process, and technology controls on how well you’re protecting against cyber risks

View on Demand
Program3Image

Risk Assessment

In this webinar, Jennifer Stockwell, National Cyber Security Principal at Telstra, joins Farah Chamseddine, Cyber Security Architect at Microsoft ANZ to discuss cyber risk analysis and assessment, including:

  • Continual evaluation of organisational risk appetite for ongoing cyber risk assessment
  • Using popular, standard risk assessment frameworks for cyber threat evaluation
  • Controls like monitoring, logging, testing, and reviews to keep cyber risk assessment information up to date

View on Demand
Program4Image

Risk Response

In this session, Group Chief Security Officer for NAB, Sandro Bucchianeri, speaks with Antoinette Jago, Security Solution Specialist on his experiences with Risk Response as they look at:

  • Where we see the risk function sitting in this ever-changing world
  • How risk management roles fit into an organisation
  • Tips on how to monitor risks after they’ve been responded to

View on Demand
Program5Image

Risk Monitoring

In this 5th episode of our Managing Cyber Risk webinar series, our Microsoft specialists are joined by Paul O'Rourke, Global Cyber Leader & Managing Director, Boston Consulting Group, where they discuss:

  • New trends in cyber risk monitoring and tracking tools
  • Monitoring cyber risk from third parties at any level (tier one to tier “N”)
  • Improving your use of DevOps and SecDevOps to track cyber risk better

View on Demand
Program6Image

How Microsoft Manages Cyber Risk

Join Abbas Kudrati, Chief Cybersecurity Advisor for Microsoft Asia Pacific, in the final webinar of our six-part Managing Cyber Risk series to find out about:

  • Robust organisational structures for enterprise-wide risk-based cybersecurity
  • Simple, intuitive tools for making the right cyber risk decisions
  • Shared lessons and best practices on risk management and risk-based cybersecurity

View on Demand
Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image

Program1Image

Program2Image

Program3Image

Program4Image

Program5Image

Program6Image

Program7Image

Program8Image

Program9Image

Program10Image

Program11Image

Program12Image

Program13Image

Program14Image

Program15Image

Program16Image

Program17Image

Program18Image

Program19Image

Program20Image