Staffing and Training a Cyber Incident Response Team

Today’s enterprises are under attack. Whether it’s malware, ransomware, social engineering, or targeted exploits, security teams must be ready to detect these cyber attacks, analyze the threat, and launch a quick and effective response. Is your organization ready?

There are a wide variety of IT security tools available for cyber incident response. But most organizations have discovered that it’s people – the analysts and technicians who make up the cyber response team – that provide the key knowledge needed to recognize the exploits and instigate critical actions in the event of a cybersecurity incident.

On Demand
1h 00min

Attend this webinar and you'll:

  • Get insight on how to build and train a cyber incident response team
  • Learn what to look for as you’re staffing up, including the experience and certifications the team members should have
  • Discover how to keep your team members up to speed on the latest threats – from methods of training to threat intelligence sources to how to plan and rehearse incident response programs before an intrusion occurs.
  • Understand some of the critical “people and process” elements of incident response, and how to maximize the capabilities of your cyber incident response team.

Featured Speakers

  • Gal Shpantzer
    Gal Shpantzer
    Independent Security Professional

    Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

  • Max Vetter
    Max Vetter
    Chief Cyber Officer
    Immersive Labs

    Max has over 15 years’ experience in the cyber industry. Having studied astrophysics at university he moved into a role in the Met police targeting industrial and commercial crime. It was here that he also started exploring open source intelligence which led to the Dark Web. He specialized in internet investigations into darknets and cryptocurrencies. He also taught at the GCHQ summer school, educating the students on reverse engineering and ethical hacking.

  • Tim Wilson
    Tim Wilson
    Editor in Chief and Co-Founder
    Dark Reading

    Tim Wilson is Editor in Chief and co-founder of Dark, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one of the top cyber security journalists in the US in voting among his peers, conducted by the SANS Institute. In 2011 he was named one of the 50 Most Powerful Voices in Security by SYS-CON Media.

Sponsored By