By browsing this site, you are agreeing to our cookie policy. More Information

Data Breaches & 5 Key Elements of an Effective Incident Response Plan

60 min

Attacks happen, but they don’t have to turn into catastrophes.

The Equifax breach will go down as one of the most significant data breaches in U.S. history, with attackers compromising the personal information of over 140 million people. 

So what’s the difference between a benign security incident and a headline data breach?


With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines.  The modern CISO should expect and plan for their organization to be breached.  Many organizations are now shifting their resources from perimeter protections to incident response with a mindset of continuous compromise. 

Join EnCase experts and Mike Rothman of Securosis for a 1-hour discussion on what components make an effective incident response plan.

We will discuss:

  • How to audit your environment to understand where you are most at risk
  • How rapid detection and response dramatically reduces the potential for a data breach
  • How  technical automation and contextualization is necessary to augment security decision making
  • Lessons learned from the Equifax breach and how to avoid the headlines


  • Mike Rothman, President, Securosis
  • Charles Choe, Sr. Product Marketing Manager, OpenText (formerly Guidance Software)

Related Topics:
Incident Detection , Endpoint Detection and Response , Incident Response

Related Products:
EnCase Endpoint Security

You May Also Like


360° Threat Detection: EnCase Endpoint Security + ...

OpenText is pleased to announce EnCase™ Advanced Detection – a new add-on for new or existing users of EnCase™ Endpoint Security. Together, they provide true 360° threat detection, with malware detect...

Navigating a Breach & Activating a Proven Incident...

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the per...