Incident Response - Plan to Fail Well

In today’s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well. With data breaches on the rise, it’s time to sharpen your institution’s response procedures and improve your Incident Response Plan. In this session, core steps required for most incidents will be highlighted and specialized components for DDOS, malware, ransomware, CATO, and unauthorized access incident types will be examined. Explore the importance of incorporating forensic analysis procedures into your standard procedures to better address emerging threats and decrease liability.

Covered Topics:

  • Internal Communications
  • Incident Containment, Eradication, and Recovery
  • External Communications
  • Integration of Forensics
  • Insider Threats

Who Should Attend?

Information Security Officer, IT Manager, Network Administrators, Risk Officer, Chief Information Officer, Forensics Analysis, Security Analyst, and management team members involved in cybersecurity and incident response processes.


Connection Error #D55. For immediate assistance, please use our online chat (lower right corner of this page).
   OnDemand Recording - $295   
   CD-ROM - $345