Best Practices to have a Strong Cyber Security Incident Response

Duration

60  Mins

Level

Basic & Intermediate & Advanced

Webinar ID

IQW18K1105

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
  • Outlining the critical actions to take if an event affects the company or its partners
  • Understanding an organizations’ susceptibility to a Cyber Attack
  • Cyber Incident Response: Getting started, research, training, testing and maintaining
  • Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA AND HITRUST

Overview of the webinar

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation. Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them asappropriate, taking into account compliance recommendations? Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement. Learn how to develop a  CSIRT Policies, Program, Plan, Playbook, Training and Exercises.

Who should attend?

  • Information Security Managers
  • CEO, CIO, CFO, CSO
  • Technology Managers
  • Auditors

Why should you attend?

Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures?

Cyber incident costs include:

  • Customer breach notifications
  • Post-breach customer protection 
  • Regulatory compliance (fines)
  • Public relations/crisis communications
  • Attorney fees and litigation
  • Cybersecurity improvements
  • Technical investigations

The hidden costs of impacts include:

  • Insurance premium increases
  • Increased cost to raise debt
  • Operational disruption or destruction
  • Lost value of customer relationships
  • Value of lost contract revenue
  • Devaluation of trade name
  • Loss of intellectual property (IP)

Faculty - Dr.Michael C. Redmond

Dr. Michael C. Redmond is a globally recognized expert in Enterprise Risk Management, Governance, Risk and Compliance

With extensive experience advising board members, CISO’s, CEOs, and others for Private and Public Organization, , Dr. Redmond brings a wealth of knowledge and practical insights. She has been a lecturer, trainer, consultant and auditor for 20 years. She is a published author and her books are sold in over 35 countries, Mastering Business Continuity Management, Mastering Your Introduction to Cyber Security, Evolving Roles of Chief Information Security Officer’s and Chief Risk Officers, Mastering Your Work Life Balance. She has over 30 certifications including International Standards.

100% MONEY BACK GUARANTEED

Refund / Cancellation policy
For group or any booking support, contact: