In today’s world, every organization no matter how large or small needs an Incident Response Plan in place to quickly manage and address the consequences of a breach. The volatility of today’s threat landscape makes an incident response (IR) more challenging than ever. This webinar is designed to give information security professionals an overview of the various considerations and aides in IR planning.
Why Should You Attend:
How your business responds to a security incident can have a profound effect on the ability to recover from an attack and prevent a future occurrence. Stemming from fiduciary responsibilities, an IT leader’s due-care drives appropriate information security due-diligence activities. Administrative due-care redresses activity responsibility, whereby due-diligence includes continuously promoting compliance. Interpretively, an organization’s information systems should represent resources committed to collecting data, processing transactions, and communicating operational results within defined legal limits. Consequently, an enterprise’s management must ensure the exercise of due-diligence by all individuals involved in the development as well as the deployment of information systems.
An incident can be any event which is not part of standard information technology (IT) operations that causes or may cause an interruption to or a reduction in agreed-upon quality of service. Incidents -- whether caused by malware, spyware, or defects -- are a common occurrence requiring appropriate resolution to reinstate acceptable operational levels. Since there is an expectation of timely corrective action when an incident occurs, user orientation is critical for maintaining precipitations of an efficient and effective IT service desk. Therefore, entities should establish formal IT incident response mechanisms as well as ensure IT users are aware of established arrangements and how to utilize them.
Areas Covered in the Webinar:
- Summary of the current data privacy and security landscape
- Understanding data breach response
- Critical components of Cyber Incident Response Plans
- Building an effective internal Incident Response Team
- Communications development before and during an incident
- Recommendations on analyzing your solution providers plan
- How a Cyber Incident Response Plan differs from a Disaster Recovery Plan
- Challenge of incident response in today’s volatile threat landscape
- Key elements of data breach prevention and response
- Integrating Incident Response into security operations and development operations
- Required people, processes, and technologies
Who Will Benefit:
- Payment professionals
- Accountant
- Operations personnel
- Vendor Managers
- Disaster Recovery professionals
- Call center personnel
- Incident response team members
- Information security analyst
- Chief Security Officer
- Risk Manager
- Chief Information Officer
- Chief Operations Officer
- Information Security Manager
- Chief Executive Officer
- Chief Financial Officer