Contact the Host for event and ticket information

Creating a Cyber Incident Response Program That works

Wednesday, Feb 20, 2019 at 10:00AM - 1:00PM

Online Event

  • Feb 2019

    20 Wed

    10:00AM

  • Feb 2019

    20 Wed

    1:00PM

Add to Your Calendar

Event is over!

Creating a Cyber Incident Response Program That works

Wednesday, Feb 20, 2019 at 10:00AM - 1:00PM

Fremont, CA , United States of America

No tickets available

Description

Learn how to develop a CSIRT Policies, Program, Plan, Playbook, Training, and Exercises. The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation. Information Security, Governance & Risk, are all critical aspects of the planning and execution of the Information Security Plan. Who in your organization has a key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as appropriate, taking into account compliance recommendations? Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement.


Objectives of the Presentation

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
  • Outlining the critical actions to take if an event affects the company or its partners
  • Understanding an organizations' susceptibility to a Cyber Attack
  • Cyber Incident Response: Getting started, research, training, testing and maintaining
  • Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA AND HITRUST

Why Should You Attend
Is your Cyber security Incident Response team trained to respond in an Incident? Many organizations thought they were and then the results proved otherwise. Are you willing to risk your Business Reputation? Coordination of incident handling stops duplication of effort. Training should concentrate not only on the capability to react to incidents but the ability to utilize the resources to alert and inform its stakeholders. We will cover tabletop tests, tabletop exercises, full Red Team Blue team training. Playing the role of an attacker can make your team better at defense. Many companies exercise not using formal blue teams. This is an effective way to have a more realistic idea of their true defensive capabilities. Exercises do not have to be expensive. There are so many types of tests.

Who Will Benefit

  • Information Security Managers
  • CEO, CIO, CFO, CSO
  • Technology Managers
  • Auditors
  • Security Planners
  • Technology Managers
  • Association of Contingency Planners
  • Audit Associations
  • Internal Auditors Association
  • Continuity Planners
  • Business Continuity Planners
  • Disaster Recovery Continuity Planners
  • Risk Managers and Internal Auditors
Note: Use Promo Code YDEZ6H and get 10% off on registration (Valid till 28th  FEBRUARY 2019)

Share This Event

More Events From This organizer

e
z
E
v
e
n
t