Training

The Anatomy of a Data Breach

The Anatomy of a Data Breach

When a data breach occurs - or is suspected - organizations are defined by how quickly and effectively they respond. Incident response plan? Most senior leaders say they have one. Many say they even have a pre-defined response team. Still, headlines and lawsuits reveal mis-steps, oversights and non-compliant activity. If the planning is right, why does breach response go wrong?

See Also: Deception-Based Threat Detection: Shifting Power to the Defenders

Join this session for a breach response re-enactment in which you'll gain expert insight on:

  • Best practices for breach response;
  • When to stop or slow down your team;
  • How to effectively unite the skills of internal responders, counsel and breach experts.

Background

"Hope is not a strategy."

When a data breach occurs, events and understanding unfold on an arbitrary timeline. First, there is discovery. As the days go by and more is learned, an effective incident response plan is either deployed or sorely needed! How well a breached organization reacts defines how effectively it recovers.

In this presentation, four highly credentialed, hands-on investigation and response experts from Kroll's Cyber Security practice will establish the scene -- drawn from a real event - and walk you through this data breach as if you were a member of the incident response team.

Is your incident response plan in place? Have you tested it, run your people through it time and again to practice what you propose? The heat of the moment is no time to find out where the gaps are. Hear from the experts:

  • Why it's better to react correctly rather than just quickly - even when the clock is ticking;
  • How an experienced investigator's approach differs from an internal first responder's;
  • What you need to determine about the data that's been lost - even before you confirm that it's been breached.

This is a must-attend for any organizational leader who has experienced a breach gone badly, or has yet to deal with an actual event.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.