Prevention is our primary focus in protecting our institutions, but how would we know if we failed to prevent an attack? Knowing what threats are realistic for your institution and how to detect them is a challenging task. Some statistics suggest it would take us more than 180 days to detect a breach. This would suggest we don’t know what realistic threats are to us and how to see them within our institutions.
Once we identify a threat, we need clear steps to contain, eradicate, and recover. In this session we will explore possible threats that we should be prepared for and how to build a program to protect against them. This program needs to include a forensics component that can collect, examine, and analyze evidence that will be necessary for data breach notification and legal matters that incidents create.
What You Will Learn
- Common threats
- Detection methods
- Incident response procedures
- Incident response testing methods
- Digital Forensics
Who Should Attend?
Information Security Officer, Incident Response Team Members, IT Manager, Risk Officer, Internal Auditor, and other employees responsible for incident response and information security program development.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.