Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Implementing Resilient Cybersecurity Incident Detection and Response

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

From the faster development of new technologies and products, to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense. However, as fast as business innovates, cybercrime does too – becoming increasingly sophisticated, organized and professional – driven by potentially huge financial rewards. Regardless of the measures an organization adopts to protect itself, it will be breached. Disconnecting from cyberspace is not an option, so to mitigate the cybercrime risk, organizations need to build resiliency to ensure that they respond and recover from an attack as rapidly and efficiently as possible, to limit the financial, operational and business impact.

This panel will discuss how to build resiliency and establish best practice approaches to implement an effective detection and response strategy within an organization

  • Evaluate measures and methodologies to determine whether an organization has been breached
  • Determine how to align an information security incident response strategy with the wider organizational strategy
  • Discover how to engage the wider business (PR, legal, marketing etc), partners and stakeholders in an incident response strategy and create a multi-disciplinary team from across the organization to rapidly respond to an attack
  • Identify the key elements of an effective governance framework to monitor cyber activity and the risks within the organization

Speakers

Vicki Gavin

Head of Business Continuity & Information Security, The Economist Group

    Bill Hau

    Bill Hau Vice President of Security Consulting Services, FireEye

      Wendy Nather

      Principal Security Strategist, Duo Security

        Victoria Windsor

        Moderator, Infosecurity Magazine

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.