By browsing this site, you are agreeing to our cookie policy. More Information

Navigating a Breach & Activating a Proven Incident Response Plan

Webinar
60 min

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the perimeter, one thing is more clear than ever - You can’t fight today’s threats with yesterday’s strategies. 

In the highly unfortunate event of a data breach, it is incumbent on security teams to activate a rapid response & recovery program. This means a defined, well-practiced response strategy that involves security teams, legal, executive leadership, and communications/PR support. 

Join us for this webinar to learn: 
- The importance of knowing where your sensitive data is located in the event of a breach 
- What steps are essential to response and returning your environment to a trusted state 
- What your obligation is to both the public & your affected customers 
- How to navigate the legal repercussions of a breach 
- How to maneuver the board implications of a breach 

Speakers: 
• Ed Amoroso, Former CSO AT&T & CEO, TAG Cyber 
• Ed McAndrew, Former U.S. District Attorney & Partner, Ballard Spahr LLP 
• Gary Weiss, SVP & GM - Security, Analytics & Discovery, OpenText

Related Topics:
Incident Response , Endpoint Detection and Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like

Product Video

Threat Intelligence in EnCase Endpoint Security

Prioritize your incident response efforts with embedded threat intelligence in EnCase Endpoint Security - adding critical endpoint context to incoming SIEM events and active cyber-investigations.
Video
Webinar

Data Breaches & 5 Key Elements of an Effective Inc...

With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expec...
Video