When a data breach occurs - or is suspected - organizations are defined by how quickly and effectively they respond. Incident response plan? Most senior leaders say they have one. Many say they even have a pre-defined response team. Still, headlines and lawsuits reveal mis-steps, oversights and non-compliant activity. If the planning is right, why does breach response go wrong?
Join this session for a breach response re-enactment in which you'll gain expert insight on:
Best practices for breach response;
When to stop or slow down your team;
How to effectively unite the skills of internal responders, counsel and breach experts.
Background
"Hope is not a strategy."
When a data breach occurs, events and understanding unfold on an arbitrary timeline. First, there is discovery. As the days go by and more is learned, an effective incident response plan is either deployed or sorely needed! How well a breached organization reacts defines how effectively it recovers.
In this presentation, four highly credentialed, hands-on investigation and response experts from Kroll's Cyber Security practice will establish the scene -- drawn from a real event - and walk you through this data breach as if you were a member of the incident response team.
Is your incident response plan in place? Have you tested it, run your people through it time and again to practice what you propose? The heat of the moment is no time to find out where the gaps are. Hear from the experts:
Why it's better to react correctly rather than just quickly - even when the clock is ticking;
How an experienced investigator's approach differs from an internal first responder's;
What you need to determine about the data that's been lost - even before you confirm that it's been breached.
This is a must-attend for any organizational leader who has experienced a breach gone badly, or has yet to deal with an actual event.
Webinar Registration
Premium Members Only
OnDemand access to this webinar is restricted to Premium Members.
Brill, Senior Managing Director of Kroll Cyber Security, holds a number of esteemed certifications in the privacy and security sector, including Certified Information Systems Security Professional (or CISSP) and Fellow of the American Academy of Forensic Sciences (FAAFS). Credited as the founder of Kroll's global, high-tech investigations practice, Alan is author and co-author of five books, has testified before court and governmental committees, and has been an instructor for the FBI and Secret Service, among others.
Michael DuBose
Managing Director - Cyber Security Investigations, Kroll
DuBose is Managing Director of Cyber Security Investigations at Kroll. He leads the cyber investigations practice at Kroll. Previously, Mike served as Chief of the Computer Crime and Intellectual Property Section (CCIPS) at the United States Department of Justice (DOJ), where he supervised 40 federal prosecutors and managed some of the largest investigations and prosecutions ever brought in the U.S. involving computer network intrusions, international phishing schemes, botnets, hacktivist groups, copyright piracy, theft of trade secrets, and large-scale data breaches.
Brian Lapidus
SVP - Information Security, Kroll
Lapidus is SVP of Information Security at Kroll. He currently heads the data breach notification and remediation group. A seasoned authority in business strategy, operational performance and product development, he has streamlined notification processes and overseen the development of new tools to accelerate response time and improve deliverability. A noted content authority, Brian has contributed to various publications including The Wall Street Journal, Washington Post, New York Times and CNN among others.
Jason Straight, Esq.
Managing Director, Kroll
Straight is Managing Director at Kroll. He, along with a team of specialized consultants, provides clients with assistance on digital investigations, data privacy protection, information security best practices and tactical incident response. He has been involved in or has overseen complex engagements concerning intellectual property theft, network intrusion incidents, and loss of personal customer or employee data. Straight is a frequent author, contributor, lecturer and speaker; he is also currently licensed to practice law in the state of New York.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.