By browsing this site, you are agreeing to our cookie policy. More Information

Navigating a Breach & Activating a Proven Incident Response Plan

60 min

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterday’s strategies. 

In the highly unfortunate event of a data breach, it is incumbent on security teams to activate a rapid response & recovery program. This means a defined, well-practiced response strategy that involves security teams, legal, executive leadership, and communications/PR support. 

Join us for this webinar to learn: 
- The importance of knowing where your sensitive data is located in the event of a breach 
- What steps are essential to response and returning your environment to a trusted state 
- What your obligation is to both the public & your affected customers 
- How to navigate the legal repercussions of a breach 
- How to maneuver the board implications of a breach 

• Ed Amoroso, Former CSO AT&T & CEO, TAG Cyber 
• Ed McAndrew, Former U.S. District Attorney & Partner, Ballard Spahr LLP 
• Gary Weiss, SVP & GM - Security, Analytics & Discovery, OpenText

Related Topics:
Incident Response , Endpoint Detection and Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


360° Threat Detection: EnCase Endpoint Security + ...

OpenText is pleased to announce EnCase™ Advanced Detection – a new add-on for new or existing users of EnCase™ Endpoint Security. Together, they provide true 360° threat detection, with malware detect...
Product Video

Threat Intelligence in EnCase Endpoint Security

Prioritize your incident response efforts with embedded threat intelligence in EnCase Endpoint Security - adding critical endpoint context to incoming SIEM events and active cyber-investigations.