Drafting a Data Breach Response Playbook

The cyber attackers hit their mark, and your sensitive databases have been breached: now what do you do? Whom should you call first? What should you tell customers, employees and other stakeholders; and when? Do you have a plan to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business operational at the same time? Do you know how to uphold compliance requirements, address customer questions, and pay for all the unforeseen costs of a data breach? Be prepared with some answers. In this webinar, learn what processes and procedures, tools and techniques should go into your data breach response playbook, so your infosec “bad day” doesn’t need to be worse.

Available:
Tue, Mar 09, 2021 10:00 AM PST / 01:00 PM EST
Duration:
1h 00min

When you attend this webinar, you will:

  • Identify the members of your breach response team
  • Set priorities, like what questions need answers first
  • Leave with all the action items essential to a winning breach response playbook

 

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Seth Geftic
    Seth Geftic
    Director Product Marketing
    Sophos

    Seth is a Director at Sophos focusing on endpoint security. Prior to joining Sophos he was a Director of Product Marketing at Invincea (acquired by Sophos in 2017). Seth was previously a Senior Manager in the Advanced Security Operations Center (SOC) Solution group and the cybercrime team at RSA. He is an industry expert in fields of endpoint security, breach detection, incident response, fraud, and cyber threats. Seth holds a BSBA in both Marketing and Finance from Washington University in St. Louis and is a CISSP.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By