Webcast » How to Respond to a Cyber Attack (Part 1)

board oversight of cyber risk

Event Details

This cybersecurity webcast series is hosted by Nasdaq Corporate Solutions.

A data breach responder is like a high-tech plumber. Just as a plumber does when a home’s basement floods, data breach responders identify the cause of a breach, combine forces to contain its damage, and collaborate on remediation. But while a plumber can provide reasonable assurances that the basement will not flood again, a data breach responder cannot promise the same about a future breach. In fact, another breach is not only possible, it’s likely. That is why data breaches don’t define victim companies – how they respond to it does.

Yet while today’s news outlets provide an endless stream of data breach reports, rarely is an actual incident response ever discussed. Understanding data breach response workflow not only helps a company prepare for a breach, it also helps a company manage cybersecurity risk overall. This webcast covers the most typical workflows that companies must undertake amid the incident response of a data breach. Please join as they address these issues and your questions in a one-hour webcast:

John Reed Stark, President of John Reed Stark Consulting LLC (Founder and former Chief of the SEC’s Office of Internet Enforcement)

Bret Padres, CEO of Crypsis, a data breach response and digital risk resilience firm (Former Chief of Research and Development, Computer Crimes Unit, for the U.S. Postal Service Office of the Inspector General; former Special Agent in the U.S. Air Force Office of Special Investigations where he was the lead agent on several national and international computer intrusion investigations; former head of data breach response at Stroz Friedberg and former director of digital forensics at Mandiant).

How to Respond to a Cyber Attack — 12:00 PM EDT
June 21, 2017
Webcast Details