Not much time has passed since the shutdown of the Colonial Pipeline earlier this year and the last of the supply chain cyber attacks. Do you think this will be the last one? We don’t.

These examples are a wake-up call for the ever-present risk of cyber attacks and their impact on your organization and supply chain. To increase business and operational efficiencies, reduce overhead, and increase both client and public engagement, organizations rely heavily on information technology (IT). However, an increase in cyber attacks and data breaches creates a storm of risks and challenges.

While you’re probably wondering what can be done to predict or prevent an incident like this in the future, we think the better question is: what can you do to prepare for the next one?

Protect Your Organization

PBMares presented the webinar “What Can You Do to Prepare for the Next Cyber Attack?” on October 13, 2021.  Antonina K. McAvoy, CISA, Senior Manager and Leader of PBMare’s Cybersecurity & Control Risk Services Team, discussed the three most common cyber misconceptions and exposures for your organization.  In addition, she provided guidance on controlling these risks through IT standards, best practices, and insurance coverage.  She also outlined actionable steps you can take to respond to the next cyber or supply chain attack to mitigate compromising your organization’s data – as well as your customer’s data.

Topics included:

  • Top three common cyber misconceptions and the exposures these high risks can pose to your business or organization.
  • What to look for in cyber insurance policies to identify if you have proper coverage and top reasons providers are denying claims.
  • How to map your supply chain and know who your third parties are, as well as understand their possible impact.
  • How to monitor your supply chain and your third parties’ cyber posture.
  • How to conduct proper security risk management and remediation through IT standards and best practices.

Don’t miss this opportunity to prepare your organization for the next cyber attack.

View the Webinar Recording and Slides Below