John, there are many questions that surface when one thinks about major breaches. Questions that may come to mind are, what’s it like to respond to a critical data breach in a large enterprise? What are thoughts that go through your head, and how do you set priorities on what to do first? Who should be involved in the response, and how do they work together? And how do you stop the compromise quickly and repair your systems so that it doesn’t happen again?
Attend and you’ll learn how to: - Identify a potential compromise, even when it’s been well-hidden by a sophisticated attacker
- Build security operations and incident response teams that can act quickly and efficiently in the event of a breach
- Assess the damage caused by an online attack, and how to remediate your systems so that it doesn’t happen again
|