Getting started with cybersecurity incident response

Getting started with cybersecurity incident response

HomePhriendly PhishingGetting started with cybersecurity incident response
Getting started with cybersecurity incident response
ChannelPublish DateThumbnail & View CountDownload Video
Channel AvatarPublish Date not found Thumbnail
0 Views
Mark Hofman, Chief Technology Officer at Shearwater, explains his steps for creating an incident response plan to help you get a security incident under control.

Based on the common and costly Business Email Compromise (BEC) attacks, Mark offers actionable tips for setting up an incident response process and validating your incident response plans.

You will learn more about:

What defines an incident and why an incident response plan is critical

Key elements needed to determine the scope and success factors of an incident response plan

How to assemble the incident response team, define roles and delegate responsibilities

How to ensure your plan is up to date and evolves over time

Your obligations under data breach reporting, data protection laws and information security compliance requirements

If you are interested in creating an incident response plan that protects your business, this video is for you.

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.