Incident Response Procedures
In today’s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well.
Webinar Description and Audience
In today’s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well. With data breaches on the rise, it’s time to sharpen your institution’s response procedures and improve your Incident Response Plan. In this session, core steps required for most incidents will be highlighted and specialized components for DDOS, malware, CATO, and unauthorized access incident types will be explained. Explore the importance of incorporating forensic analysis procedures into your standard procedures to better address emerging threats and decrease liability.
The following areas will be discussed with attendees to ensure institutions are prepared to have a successful response if prevention measures fail:
- Internal Communications
- Incident Containment, Eradication, and Recovery
- External Communications
- Integration of Forensics
- Insider Threats
Who Should Attend?
Information Security Officer, IT Manager, Network Administrators, Risk Officer, Chief Information Officer, Forensics Analysis, Security Analyst, and management team members involved in cybersecurity and incident response processes.
Webinar Viewing Options
INCLUDES 7 DAYS OF ONDEMAND PLAYBACK! With this option, you will participate in the webinar (via the internet) as it is being presented. You will login to the webinar on your PC to view the PowerPoint presentation, and you have the option of using your PC speakers or a telephone for the audio. You can type and send your questions to the instructor. Many companies are now running their PC through an LCD projector allowing many employees to participate at the same time. And don’t worry if you miss the webinar, you can still view it for up to seven days after it takes place!
SIX MONTH ONDEMAND VIDEO:
With this option, you will receive an e-mail that contains a link to the PowerPoint slides (to download, print, and copy) as well as a link to the media player where you will view and hear the entire webinar just as it was delivered, featuring the full-color PowerPoint presentation with audio. You can pause, fast-forward and rewind as needed, which makes it a very effective training tool. The OnDemand Video will be available to you (and anyone else in the company) for six months and can be accessed 24/7 as many times as you wish. Delivered via e-mail the day after the webinar takes place.
If you do not have internet access or want to make the webinar part of your training library, the CD-ROM Recording is a great option for viewing a webinar. You can pause, fast-forward and rewind as needed, which makes it an effective training tool. With this option, you will receive a download of the PowerPoint slides and a CD-ROM Recording (featuring PowerPoint presentation with audio) of the webinar via regular mail. Mailed 7 to 10 days after the webinar takes place.
Webinars can be scheduled and offered exclusively for your company. They can even be customized to best fit your needs. To find out more, please complete the in-house request form found in the Schedule and Registration Information section below.
Continuing Education (CE) Credits
This webinar is recommended for 2.5 CE Credit Hours. Each attendee will receive a Certificate of Attendance for self-reporting of CE Credits.