By browsing this site, you are agreeing to our cookie policy. More Information

Zero-Hour Response to a Data Breach

49 min

Someday you will get the call that no one wants to receive, notifying you that your perimeter has been breached and your data may have been compromised. Join Sheryl Falk, an attorney specializing in data security and forensic investigations to learn which actions to take—and which ones to take first—to help avoid further liability and to help your security team nip the attack in the bud.

View our one-hour webinar, “Zero-Hour Response to a Data Breach,” to learn:

  • The anatomy of a data breach
  • The basics of data-breach incident response
  • How to handle the aftermath of a breach
  • The legal landscape
  • Seven action items to take.


  • Sheryl A. Falk, Of Counsel, Winston & Strawn LLP
  • Judi Uttal, Senior Director of Product Marketing, Guidance Software

Related Topics:
Incident Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


360° Threat Detection: EnCase Endpoint Security + ...

OpenText is pleased to announce EnCase™ Advanced Detection – a new add-on for new or existing users of EnCase™ Endpoint Security. Together, they provide true 360° threat detection, with malware detect...
Product Video

Threat Intelligence in EnCase Endpoint Security

Prioritize your incident response efforts with embedded threat intelligence in EnCase Endpoint Security - adding critical endpoint context to incoming SIEM events and active cyber-investigations.