Watch Now
We gladly offer this for you to view. However, our premium content requires you to share a little about yourself.
Thank You
Thank you, John <john.doe@guid.com> (Not you?). The content is available for download below. Would you like to create an account and get access to all our premium content in the future? </john.doe@guid.com>
Password Reset
Please provide the email you used for account registration.
An email will be sent to you for further instruction.
Data Breaches & 5 Key Elements of an Effective Incident Response Plan
Webinar
6 min
Attacks happen, but they don’t have to turn into catastrophes.
The Equifax breach will go down as one of the most significant data breaches in U.S. history, with attackers compromising the personal information of over 140 million people.
So what’s the difference between a benign security incident and a headline data breach?
Response.
With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expect and plan for their organization to be breached. Many organizations are now shifting their resources from perimeter protections to incident response with a mindset of continuous compromise.
Join EnCase experts and Mike Rothman of Securosis for a 1-hour discussion on what components make an effective incident response plan.
We will discuss:
- How to audit your environment to understand where you are most at risk
- How rapid detection and response dramatically reduces the potential for a data breach
- How technical automation and contextualization is necessary to augment security decision making
- Lessons learned from the Equifax breach and how to avoid the headlines
Presenters
- Mike Rothman, President, Securosis
- Charles Choe, Sr. Product Marketing Manager, OpenText (formerly Guidance Software)
Related Topics:
Incident Detection, Endpoint Detection and Response, Incident Response
Related Products:
EnCase Endpoint Security