In this session, the core steps required for most cyber incidents will be highlighted, and specialized components for malware, ransomware, BEC, DDoS, and network compromise incidents will be examined. Explore the importance of incorporating digital forensic analysis procedures into your IRP to better address emerging threats and decrease cyber risk.
What You’ll Learn
- Roles and Responsibilities
- Threat Assessments/Indicators of Compromise
- Incident Containment, Eradication, and Recovery Playbooks
- Internal and External Communications
- Integration of Forensics
- Notification Requirements
- And more!
Who Should Attend
This session is ideal for IT and IS professionals who need to understand the strategic and regulatory aspects of cybersecurity to better support their organization’s goals. Attendees will gain valuable insights into current cybersecurity threats, regulatory guidance, and best practices for developing a robust cybersecurity program.