Navigating a Breach & Activating a Proven Incident Response Plan

Webinar
6 min

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterday’s strategies. 

In the highly unfortunate event of a data breach, it is incumbent on security teams to activate a rapid response & recovery program. This means a defined, well-practiced response strategy that involves security teams, legal, executive leadership, and communications/PR support. 

Join us for this webinar to learn: 
- The importance of knowing where your sensitive data is located in the event of a breach 
- What steps are essential to response and returning your environment to a trusted state 
- What your obligation is to both the public & your affected customers 
- How to navigate the legal repercussions of a breach 
- How to maneuver the board implications of a breach 

Speakers: 
• Ed Amoroso, Former CSO AT&T & CEO, TAG Cyber 
• Ed McAndrew, Former U.S. District Attorney & Partner, Ballard Spahr LLP 
• Gary Weiss, SVP & GM - Security, Analytics & Discovery, OpenText

Related Topics:
Incident Response, Endpoint Detection and Response, Incident Detection

Related Products:
EnCase Endpoint Security