Round Table Agenda
The agenda below covers a 5 stage plan drafted during the roundtable aligned to your business. The output will provide you with a draft Target Operating Model (TOM) that will enable cybersecurity to form part of your business process to maintain and manage the operational cost of cyber Security and effectively manage risks for the business.
Stage 1
- Mapping your current Cybersecurity Operating Model
- Identifying gaps in your current Cybersecurity Operating Model
- Understanding your non technical security challenges
- Mapping security technology to business process and operations
- Understand what good looks like
- Drafting of a Cyber security strategy with clearly defined objectives and goals
- Roles and responsibilities (RACI) for all technology components, business process, stakeholders including, technical partners and 3rd parties
- Clearly define Cyber Security KPIs that will highlight technology, process and or people's effectiveness
- Drafting of Protection level Agreements to measure the effectiveness of operationalising cyber security
- Monthly and quarterly reporting requirements aligned to personas that can be translated for stakeholders to understand.
Lunch details
Lunch will be served during the roundtable discussion from 12:00pm to 14:00pm
Zuiver Restaurant - Utrecht
Krommewetering 51
3543 AM Utrecht, The Netherlands
To secure your place, please fill the form below and RSVP no later than February 20th 2023.