Course Number: Webinar
Course Code: n/a
In today?s cybersecurity world, we can no longer hide behind the assumption that business will never be compromised. Institutions must ensure adequate investments in security are made, not only in prevention, but in the detection of threats and effective incident response as well. With data breaches on the rise, it?s time to sharpen your institution?s response procedures and improve your Incident Response Plan. In this session, core steps required for most incidents will be highlighted and specialized components for DDOS, malware, ransomware, CATO, and unauthorized access incident types will be examined. Explore the importance of incorporating forensic analysis procedures into your standard procedures to better address emerging threats and decrease liability.
-Incident Containment, Eradication, and Recovery
-Integration of Forensics
Audience: Information Security Officer, IT Manager, Network Administrators, Risk Officer, Chief Information Officer, Forensics Analysis, Security Analyst, and management team members involved in cybersecurity and incident response processes.