Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Implementing Resilient Cybersecurity Incident Detection and Response

From the faster development of new technologies and products, to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense. However, as fast as business innovates, cybercrime does too – becoming increasingly sophisticated, organized and professional – driven by potentially huge financial rewards. Regardless of the measures an organization adopts to protect itself, it will be breached. Disconnecting from cyberspace is not an option, so to mitigate the cybercrime risk, organizations need to build resiliency to ensure that they respond and recover from an attack as rapidly and efficiently as possible, to limit the financial, operational and business impact.

This panel will discuss how to build resiliency and establish best practice approaches to implement an effective detection and response strategy within an organization

  • Evaluate measures and methodologies to determine whether an organization has been breached
  • Determine how to align an information security incident response strategy with the wider organizational strategy
  • Discover how to engage the wider business (PR, legal, marketing etc), partners and stakeholders in an incident response strategy and create a multi-disciplinary team from across the organization to rapidly respond to an attack
  • Identify the key elements of an effective governance framework to monitor cyber activity and the risks within the organization

Speakers

Vicki Gavin

Head of Business Continuity & Information Security, The Economist Group

    Bill Hau

    Bill Hau Vice President of Security Consulting Services, FireEye

      Wendy Nather

      Director of Advisory CISOs, Duo Security

        Victoria Windsor

        Moderator, Infosecurity Magazine

        Brought to You by

        Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.

        What’s Hot on Infosecurity Magazine?