The Real Impact of a Data Security Breach

A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers.

Available:
On Demand
Duration:
1h 00min

In this webcast, experts discuss:

  • The real losses associated with a breach, both in the data center and in the business
  • How an effective data breach response program can help mitigate the damage.

Featured Speakers

  • Tim   Wilson
    Tim Wilson
    Editor in Chief
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

  • Scott  Sanders
    Scott Sanders
    Sales Engineer
    Kaspersky Lab

    Scott Sanders is a sales engineer for Kaspersky Lab who is passionate about cyber security and protecting people from malware. He has been working in the tech industry for over 19 years with extensive knowledge around security software and network hardware. Scott is a Navy veteran who currently resides in the Dallas/Fort Worth area.

  • Chris   Novak
    Chris Novak
    Director, Global Investigative Response
    Verizon

    Christopher Novak is a co-founder and the Director of the Verizon Investigative Response Unit a division of the Verizon RISK Team. He is an internationally recognized expert in the field of Investigative Response and Computer Forensics. He has been involved with information security for over a dozen years. Christopher has assisted corporations, government agencies, and attorneys with all matters involving computer forensics, fraud investigations, and crisis management.

Sponsored By