event-icon
Description

Session ID: 586

Abstract:

Your job, your career, your company's very survival could depend on what you do next.
When minutes count, having a plan in place along with well-practiced response
procedures can make the difference between the merely bad and the catastrophic.

There are two kinds of organizations, those that know their security has been
compromised and those that don't. We've talked for years about how bad things
can happen, and the ways to prevent them. Hacking is in the news almost every
day. Governments have passed laws with increasing penalties. The credit card
industry has spent tens of millions of dollars ensuring credit cards and their
transactions are secure. And yet, its almost like we've been discussing
umbrellas, raincoats and weather forecasts, while it only takes one raindrop
to get wet. We're not giving up on prevention but we should all agree that
security compromises are so probable as to be almost, inevitable.

We will be discussing in very specific detail, a disciplined approach to dealing
with a hacking incident or data compromising event. We will discuss detection,
initial assessment and containment, forensic and investigate procedures, data recovery
and validation, engagement of legal and law agencies, corporate governance,
identifying affected parties and communicating with individuals andregulatory agencies.

Objective 1: Understand the event the issues

Objective 2: Be able to identify issues within attendee's organization

Objective 3: Improved communications with management

Audience: In-Depth

Tags