Skip to main content

Mastercard Webinar: How to Evolve to Beat Cyber Crime - Middle East & Africa

On-Demand

The Covid-19 crisis is of unprecedented scale and scope and has noticeably impacted cybersecurity budgets, stretching Chief Information Security Officer's abilities to effectively respond to increased threats and attacks. 

As organizations work towards equipping their business to operate in the new normal, how can Chief Information Security Officer's in the Middle East and Africa support the broader corporate strategy, with limited budgets, whilst addressing the tactical requirements for companies and their various constituents to remain safe? 

Webinar Speakers:

Urjooj headshot  

Urooj Burney

Senior Principal, Cyber Security Services (Middle East & Africa), Mastercard

     
Rebecca headshot  

Rebecca Ledingham 

Vice President, Cyber & Intelligence Solution, Mastercard 

This Webinar Will Cover:

  • Covid-19: implications on cyber security and business continuity 

  • Indentifying risk and detecting vulnerabilities across critical business processes 

  • Evaluating the effectiveness of controls and benchmarking your cyber security capabilities 

  • Staying ahead of cyber threats: Risk mitigation strategies and incident response planning 

Join the Webinar

Related Resources

Expert Insights
Catching Heat: How to Evolve to Beat Cyber Crime

There’s a scene in the 1995 movie Heat when master criminal, Neil McCauley, and the police officer on his tail, Detective Hanna, meet in a restaurant. They share similar personalities, and slowly they evolve as criminal and cop together.

Expert Insights
Water Under the Breach: The Sunk Costs of Cyber Security

With the costs of cyber security on the rise and lack of visibility into the most productive cyber security controls, organizations are learning they need to better quantify and prioritize their investments to stay ahead of the game.

Expert Insights
Cyber Security Regulations Require Strict, Standardized Security Best Practices

Cyber security regulations require strict, standardized security best practices.