Back to All Events
We will cover standardising reporting, requesting assurance and promoting the collaboration between the business and technology teams:
Tailoring an approach to cyber governance that is suitable for organisations with high supplier dependence.
Applying the Three Lines of Defence model to establishing cyber security accountability - and identifying the boundaries of the model for cyber.
When to request a pen-test and when red-teaming might be the better choice.
Considering when to request a a cyber maturity assessment.
Improving the collaboration between business and technology teams.
How to interprete a SOC2 report.
Your board pack: Reports and metrics covering cyber resilience.