Cyber Security Video Series

Cyber-security risks and the increasing awareness, occurrence, and impact of cyber incidents confronting corporations are a rapidly growing concern to investors, senior executives, and policy setters. Driving this concern are unprecedented corporate dependencies on digital technologies which are growing at an exponential rate. Indeed, the impact of digital technologies on today’s corporations are beyond what would have imagined at the turn of the 21st century, let alone two or three decades ago. Unfortunately, determining the actual, let alone potential, cyber security risks an impact of cyber incidents confronting corporations is far from an exact science.

We invite you to view our cyber security video series, where a number of our PwC professionals and their distinguished guests discuss the current landscape of cyber security threats, and the steps companies should consider to in connection with making business decisions to manage security and the associated opportunities.

 
Is the cloud safe?Is the cloud safe?
The challenge of mobility.?The challenge of mobility.
Credit cards and security.Credit cards and security.
Are you prepared for today's cyber threats?Cyber Crisis Management Watch the entire video
 

Is the cloud safe?
This section will provide viewers with an overview of many of the security, risk and governance aspects of moving to the cloud. Our panel of cyber and security professionals discuss what organizations should consider before moving data, applications, or business proceeded to the cloud, steps they may take to better secure their data, and how to begin to be prepared for an incident.

The challenge of mobility.
Employee and consumer use of mobile devices has skyrocketed, creating novel threats to information security. Businesses that understand and are prepared for the risks and the opportunities can enhance productivity and gain competitive advantage. Our panel of cyber and security professionals discuss the risks and opportunities associated with accessing corporate data or enabling business processes from mobile devices, provide guidance regarding the need for education for end-users, and how to effectively embrace the mobile change.

Payment cards and security.
PCI is generally perceived as a complex security standard of extensive lists of security control requirements, various validation and reporting mechanisms, and merchant classification categories. Our panel of cyber and security professionals discuss the controls that should be in place around the data, key compliance considerations, and aspects of responding to a breach.

View the other videos in this series

PwC talks about cybersecurity: C-suite perspective
This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on why cybersecurity strategy is a significant business issue that can no longer be treated as just an IT challenge. It belongs in the boardroom, not the server room. Company leaders and boards can no longer afford to view cybersecurity as a technology problem; the likelihood of a cyberattack means it should be viewed an enterprise risk management issue.



PwC talks about cybersecurity: understanding the threat landscape
This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, discussing their experiences on the new breeds of threats and attackers. Nation states, organized crime, hactivists, terrorists, and even employees are all potential adversaries. These adversaries are sophisticated, determined, and patient, and they will target individuals, companies, or industries to gain advantage. Their motives range from economic espionage, to rapid monetization of information, to advancing political agendas.



PwC talks about cybersecurity: global trends
This video features PwC partners David Burg, Michael Compton, and John Garvey, sharing their experiences on how companies are managing cybersecurity risk, espionage and brand reputation. Intellectual property, competitive advantages, brand reputations have already been compromised at businesses in all industries and sizes. The result has been loss of future cash flows and unexpected costs.



PwC talks about cybersecurity: evolving strategy
This video features PwC partners David Burg, Michael Compton, and John Garvey, sharing their experiences on the changing threat landscape and the strategies needed to protect the enterprise. Today's information security model doesn’t address new threats and realities. We all need to understand what has changed, what we are doing today and why that is no longer sufficient, and how we need to rethink security and its management throughout the enterprise.



PwC talks about cybersecurity: security for the evolved ecosystem
This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on moving security beyond four walls and into the extended ecosystem. Businesses are more interconnected, integrated, and interdependent—creating dynamic and evolving business ecosystems. Trusted business relationships and interactions with customers, service providers, suppliers, partners, and employees rely on securely sharing information assets and critical data.



PwC talks about cybersecurity: identifying key assets
This video features PwC partners David Burg, Michael Compton, and John Garvey, sharing their experiences on protecting the “crown jewels” of the enterprise. Safeguarding all data at the highest level is just not realistic or possible. Loss of some types of data is troubling; loss of others can destroy parts of your business and require a heightened level of protection.



PwC talks about cybersecurity: changing corporate behavior
This video features PwC partners David Burg, Michael Compton, and Adam Gutstein, sharing their experiences on why security as usual doesn’t work anymore. Security models today focus most of their resources on how to prevent an attack … an unlikely probability in today’s world. Attacks are extremely common and often successful. In fact many attacks are so stealthy that adversaries remain unnoticed for long periods of time.