In today’s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well. With data breaches on the rise, it’s time to sharpen your institution’s response procedures and improve your Incident Response Plan. In this session, core steps required for most incidents will be highlighted and specialized components for DDOS, malware, ransomware, CATO, and unauthorized access incident types will be examined. Explore the importance of incorporating forensic analysis procedures into your standard procedures to better address emerging threats and decrease liability.
What You Will Learn
- Internal Communications
- Incident Containment, Eradication, and Recovery
- External Communications
- Integration of Forensics
- Insider Threats
Who Should Attend?
Information Security Officer, IT Manager, Network Administrators, Risk Officer, Chief Information Officer, Forensics Analysis, Security Analyst, and management team members involved in cybersecurity and incident response processes.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.