John, your security operations team spends most days scanning for potential threats and eliminating vulnerabilities. But what about that “very bad day” when a major breach occurs? How do you deploy your resources, and who does what? Learn all about the key elements behind security operations and incident response at our panel session " What Every Enterprise Should Know About Security Operations and Incident Response," at this Dark Reading virtual event.
Take a second look at your breach response plan and get a deeper insight on how security operations and incident response programs should work in the event of a major cyber-attack. You’ll get a closer look at how security operations can detect and assess the extent of an exploit, and how you can trigger a response to help mitigate it – even if your "incident response team" is only one or two people.
- Advice and tips on how to uncover a well-obfuscated attack
- Hints on how to use data analysis to reveal multi-pronged exploits
- Recommendations on how to process alerts and alarms and prioritize your responses
|