Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Implementing Resilient Cybersecurity Incident Detection and Response

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

From the faster development of new technologies and products, to global connectivity, collaboration and innovation, the benefits presented by cyberspace are immense. However, as fast as business innovates, cybercrime does too – becoming increasingly sophisticated, organized and professional – driven by potentially huge financial rewards. Regardless of the measures an organization adopts to protect itself, it will be breached. Disconnecting from cyberspace is not an option, so to mitigate the cybercrime risk, organizations need to build resiliency to ensure that they respond and recover from an attack as rapidly and efficiently as possible, to limit the financial, operational and business impact.

This panel will discuss how to build resiliency and establish best practice approaches to implement an effective detection and response strategy within an organization

  • Evaluate measures and methodologies to determine whether an organization has been breached
  • Determine how to align an information security incident response strategy with the wider organizational strategy
  • Discover how to engage the wider business (PR, legal, marketing etc), partners and stakeholders in an incident response strategy and create a multi-disciplinary team from across the organization to rapidly respond to an attack
  • Identify the key elements of an effective governance framework to monitor cyber activity and the risks within the organization


Vicki Gavin

Head of Business Continuity & Information Security, The Economist Group

    Bill Hau

    Bill Hau Vice President of Security Consulting Services, FireEye

      Wendy Nather

      Wendy Nather Research Director, Information Security, 451 Research

        Victoria Windsor

        Moderator, Infosecurity Magazine

        Brought to You by