Please download one of these browsers:
Keep your browser version up-to-date for a fast, secure, web experience.
Niels Søby Vesterager presents frameworks for structuring board presentations, applying CMMI maturity levels to measure NIS2 progress, and building trust through transparent communication.
Egon Van Dongen examines combining technology and practices to address modern cyberthreats, achieving unprecedented results with air-gapped recovery and analyzing a real-world polymorphic mirror ransomware attack.
Robert Valkama discusses establishing compliance expert groups within security governance, mapping regulatory articles to internal requirements, and creating implementation guides that communicate what compliance means operationally.
Petrut Jianu and Jonas Rendahl explore communicating consequences of OT system failures and quantifying potential benefits of OT security investments to demonstrate positive financial impact beyond cost centers.
Andreas Östrin examines establishing cross-functional steering groups with clear responsibilities, conducting business mapping and risk assessment across processes, and implementing compensating controls like network isolation.