Prevention is our primary focus in protecting our institutions, but how would we know if we failed to prevent an attack? Knowing what threats are realistic for your institution and how to detect them is a challenging task. Some statistics suggest it would take us more than 200 days to detect a breach. This would suggest we don’t know what realistic threats are to us and how to see them within our institutions.
Once we identify a threat, we need clear steps to contain, eradicate, and recover. In this session we will explore possible threats that we should be prepared for and how to build a program to protect against them. This program needs to include a forensics component that can collect, examine, and analyze evidence that will be necessary for data breach notification and legal matters that incidents create.
What You Will Learn
- Common threats
- Detection methods
- Incident response procedures
- Incident response testing methods
- Digital Forensics
Who Should Attend?
Information Security Officer, Incident Response Team Members, IT Manager, Risk Officer, Internal Auditor, and other employees responsible for incident response and information security program development.
Continuing Education (CE) Credits
This webinar is recommended for 2.5 CE Credit Hours. Each attendee will receive a Certificate of Attendance for self-reporting of CE Credits.