1. Identify measures that can be incorporated into existing systems, and the impact on accurate and cost effective response in the event of an incident or breach situation.
2. Discuss potential sources of valuable information frequently under- or un-utilized simply because the information isn’t needed until an incident occurs; by that time, it’s too late to resurrect it.
3. Explore recent developments in Incident Detection and Response.
Computer intrusions and misuse, phishing, sabotage, corporate espionage, lost or stolen laptops, backup tapes—these are just some examples of the incidents plaguing organizations today. Are you prepared? Not all incidents can be prevented, but an effective incident response program can mitigate their impact and hasten resolution. Once a security incident is suspected, it is critical to move quickly to corroborate the incident in a manner that preserves potential evidence for later use. This session will highlight the common risks organizations face and ways in which they can prepare and respond promptly and effectively.