Incident Response and Forensics

Prevention is our primary focus in protecting our institutions, but how would we know if we failed to prevent an attack? Knowing what threats are realistic for your institution and how to detect them is a challenging task. Some statistics suggest it would take us more than 180 days to detect a breach. This would suggest we don’t know what realistic threats are to us and how to see them within our institutions.

Once we identify a threat, we need clear steps to contain, eradicate, and recover. In this session we will explore possible threats that we should be prepared for and how to build a program to protect against them. This program needs to include a forensics component that can collect, examine, and analyze evidence that will be necessary for data breach notification and legal matters that incidents create.

What You Will Learn

  • Common threats
  • Detection methods
  • Incident response procedures
  • Incident response testing methods
  • Digital Forensics

Who Should Attend?

Information Security Officer, Incident Response Team Members, IT Manager, Risk Officer, Internal Auditor, and other employees responsible for incident response and information security program development.


Connection Error #D55. For immediate assistance, please use our online chat (lower right corner of this page).
   OnDemand Recording - $295   
   CD-ROM - $345