The FBI is on the Phone…Something about a Data Breach?

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

Infosecurity Magazine collects personal information when you register for our magazine and sponsored content. We will use this information to deliver the product or service for which you are registering.

We will also share your information with the declared sponsor of any webinar, whitepaper or virtual event for which you register and this sponsor is clearly indicated on each event page. You can opt out at any time in your user account.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions and privacy policy.

What would be your response if you received this call? And if you think it will never happen, then think again.

According to the latest Data Breach Investigations Report from Verizon, 92% of the incidents it reviewed were discovered by a third party, including law enforcement. Even more worrisome were the 85% of data breaches that went undetected for more than a week – a critical time gap that provides information thieves with their best opportunity to roam around and pilfer on your network.

Is it possible to avoid this “oh sh@#!” moment, or are moments like this inevitable in today’s interconnected environment? If data breach incidents cannot be avoided, they can certainly be limited with the proper approach, and responded to effectively. That’s what this one-hour webinar will discus, along with our panel of experts in data breach and forensic response.

Topics in this program will include:

  • The role of proactive defense strategies in limiting data leakage and overall risk exposure
  • How to respond when a breach does occur, and how to decrease the window between infiltration and detection
  • The role of post-incident analysis




Drew Amorosi

Drew Amorosi Deputy Editor, Infosecurity Magazine

Erin Cox

Erin Cox Executive Managing Director, Stroz Friedberg

    Rick Holland

    Senior Analyst, Security & Risk Management, Forres

      Chris Novak

      Managing Principal, Global Investigative Response

        Patricia Titus

        Former CISO, Symantec

          Should you register for this event your information will be shared with the sponsor indicated above. See our privacy policy for more information.