Security and risk management case studies

Hear how your peers have solved key challenges you face today in our just announced case study presentations.

Clive Novis

Investec
Chief IT Risk Officer

 

Investec: Using an IT Risk appetite as a Foundation for Improving a Risk Management and Control

 

This session will explore how Investec Bank plc created a Board-Approved IT / InfoSec risk appetite and the benefits they are enjoying. Key questions addressed will include:

 

  • How can you report risk to the board?
  • How can you align to policies and controls?
  • How can risk assessments be conducted?
  • How can you create crisis management team plans?

Nathan Macrides

Royal Bank of Canada
Senior Director – Head of Security Architecture

 

RBC - How to Develop a Security Architecture Practice for a Global Business

 

At Royal Bank of Canada, the value of security architecture was not understood by the business. This case study describes how the head of security architecture communicated the role that security architecture could play in guiding transformation to meet business requirements, mitigating risk and increasing ROI. Key topics addressed include:

 

  • How the role of security architecture was defined and communicated
  • How successful partnerships were built across the business
  • How security architecture has guided cyber transformation

Richard Rushing

Motorola Mobility a Lenovo Company
Chief Information Security Officer

 

Motorola Mobility: Achieving Visibility Across the Enterprise as a First Step Toward Automation and Orchestration

 

Motorola Mobility is one of the world’s fastest growing smartphone providers. As their network grew, they needed to build a security architecture that scaled to cover it. This case study shows how Motorola Mobility has increased its visibility into the activity taking place across the network and will give you a recipe that you can substitute, change or scale to create your own version of the Security Ecosystem. Topics include:

 

  • How NetFlow, using deep packet inspection, endpoint protection, and threat intel was used for in-depth detection and response
  • How to select the right detection tools for your environment
  • Results so far and lessons learned

Jeremy Darke

Shop Direct
Head of IT Security

 

Shop Direct: Building a Cybersecurity Capability that Supports Business Digital Transformation

 

This case study explores the challenges that Shop Direct, the UK’s second largest pure-play digital retailer, faced when undergoing a digital transformation. The session will describe:

 

  • The challenges experienced by Security Operations when transforming from a legacy architecture to cloud and data sharing and how these challenges were overcome
  • How Shop Direct transformed from Waterfall to rapid agile development and embedded Security into change
  • How they assessed risk whilst minimizing impact to throughout

Prudence Smith

Barclays

Head of User Behaviour and Awareness 

 

Barclays: Closing the Cyber Skills Gap

 

It is currently being reported that 4 out of 5 organisations cannot fill cyber security positions. With the frequency of teenager-led cyberattacks growing, more should be done to encourage young people to enter cybersecurity careers and use their skills for good. How can we channel the interests of the new generation in the right way – before it’s too late and we’re left with an even wider skills gap? In this case study, Prudence Smith, Head of User Behaviour & Awareness at Barclays will share some of her strategies for hiring and retaining staff with the right skills and her thoughts on what the industry needs to do to close the cyber skills gap.

Hear from your peers