Cyber Security video series

loading-player

Playback of this video is not currently available

Is the cloud safe?

This section will provide viewers with an overview of many of the security, risk and governance aspects of moving to the cloud. Our panel of cyber and security professionals discuss what organizations should consider before moving data, applications or business proceeded to the cloud, steps they may take to better secure their data and how to begin to be prepared for an incident.

The challenge of mobility

Employee and consumer use of mobile devices has skyrocketed, creating novel threats to information security. Businesses that understand and are prepared for the risks and the opportunities can enhance productivity and gain competitive advantage. Our panel of cyber and security professionals discuss the risks and opportunities associated with accessing corporate data or enabling business processes from mobile devices. They also provide guidance regarding the need for education for end-users and how to effectively embrace the mobile change.

loading-player

Playback of this video is not currently available

loading-player

Playback of this video is not currently available

Payment cards and security

PCI is generally perceived as a complex security standard of extensive lists of security control requirements, various validation and reporting mechanisms, and merchant classification categories. Our panel of cyber and security professionals discuss the controls that should be in place around the data, key compliance considerations and aspects of responding to a breach.

Featured insights

Cybersecurity: The C-suite perspective

Cybersecurity: The C-suite perspective

This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on why cybersecurity strategy is a significant business issue that can no longer be treated as just an IT challenge. It belongs in the boardroom, not the server room. Company leaders and boards can no longer afford to view cybersecurity as a technology problem; the likelihood of a cyberattack means it should be viewed an enterprise risk management issue.

Understanding the threat landscape

Understanding the threat landscape

This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, discussing their experiences on the new breeds of threats and attackers. Nation states, organized crime, hactivists, terrorists, and even employees are all potential adversaries. These adversaries are sophisticated, determined, and patient, and they will target individuals, companies, or industries to gain advantage. Their motives range from economic espionage, to rapid monetization of information, to advancing political agendas.

Security for the evolved ecosystem

Security for the evolved ecosystem

This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on moving security beyond four walls and into the extended ecosystem. Businesses are more interconnected, integrated, and interdependent—creating dynamic and evolving business ecosystems. Trusted business relationships and interactions with customers, service providers, suppliers, partners, and employees rely on securely sharing information assets and critical data.

Contact us

Kate Glenn
Forensic Services Marketing Director
Email

Follow us