Building an Incident Readiness and Response Playbook

The cyber attackers hit their mark: now what do you do? Whom do you call first? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of an emergency? Don't make a data breach any harder than it needs to be. In this webinar, learn the Xs and Os of any good security incident readiness and response playbook.

On Demand
1h 00min

Attend this webinar and you'll:

  • Discover what extra resources you should have now to improve your resilience to an incident later
  • Identify who should be on your cyber incident response team, including the third parties you're probably forgetting
  • Learn the top do's and don'ts of forensics, so you can root out attackers without destroying evidence
  • Know how to address your compliance and data breach notification requirements
  • Leave with the fundamentals for a cyber incident readiness and response playbook that will help your organization weather any event

Featured Speakers

  • John Pironti
    John Pironti
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Marc Green
    Marc Green
    Principal Threat Intelligence Analyst

    Marc Green is an SC vetted information security professional with a focus on threat intelligence and strategy. Marc has over nine years of experience in information security, predominately spent within financial services. As Principal Threat Intelligence Analyst at Anomali, he is primarily involved with intelligence analysis and dissemination, coordinating and contributing to a number of information sharing initiatives, and engaging with trusted partner communities. Prior to joining Anomali, he led the Threat & Vulnerability Management (TVM) function at a pan-European stock exchange and has consulted on threat intelligence capability maturity. He holds a Bachelor of Science (BSc) and Master of Science (MSc) from Queen’s University Belfast and a Post-graduate Diploma from the UCD Michael Smurfit Graduate Business School, Dublin. He also holds a number of industry certifications.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By