By browsing this site, you are agreeing to our cookie policy. More Information

Navigating a Breach & Activating a Proven Incident Response Plan

60 min

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterday’s strategies. 

In the highly unfortunate event of a data breach, it is incumbent on security teams to activate a rapid response & recovery program. This means a defined, well-practiced response strategy that involves security teams, legal, executive leadership, and communications/PR support. 

Join us for this webinar to learn: 
- The importance of knowing where your sensitive data is located in the event of a breach 
- What steps are essential to response and returning your environment to a trusted state 
- What your obligation is to both the public & your affected customers 
- How to navigate the legal repercussions of a breach 
- How to maneuver the board implications of a breach 

• Ed Amoroso, Former CSO AT&T & CEO, TAG Cyber 
• Ed McAndrew, Former U.S. District Attorney & Partner, Ballard Spahr LLP 
• Gary Weiss, SVP & GM - Security, Analytics & Discovery, OpenText

Related Topics:
Incident Response , Endpoint Detection and Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


Data Breaches & 5 Key Elements of an Effective Inc...

With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expec...

[Product Series] EnCase Endpoint Security 6 Live D...

EnCase Endpoint Security is the market leading EDR solution that empowers InfoSec teams to quickly detect and respond to advanced threats, and has now been completely redesigned with a new UI/UX and enhanced detection capabilities.