Best Practices to Have A Strong Cyber Security Incident Response

Added by Referral on 2020-06-29

Conference Dates:

Start Date Start Date: 2020-07-08
Last Date Last Day: 2020-07-08
Deadline for abstracts/proposals Deadline for abstracts/proposals: 2020-06-28

Conference Contact Info:

Contact Person Contact Person: Ashutos Swain
Email Email: [email protected]
Address Address: 2479 E. Bayshore Road Suite 260, Palo Alto, CA, 94303, United States
Phone Tel: 8887172436

Conference Description:

Developing an efficient Incident Response Program that allows an organization to respond with speed and agility is crucial to empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation. Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan.

Why Should You Attend:

Is your organization prepared if your business is targeted and your Business Operations are impacted? Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures? Cyber incident costs include:

Customer breach notifications
Post-breach customer protection
Regulatory compliance (fines)
Public relations/crisis communications
Attorney fees and litigation
Cybersecurity improvements
Technical investigations
The hidden costs of impacts include:

Insurance premium increases
Increased cost to raise debt
Operational disruption or destruction
Lost value of customer relationships
Value of lost contract revenue
Devaluation of trade name
Loss of intellectual property (IP)
Don’t miss this webinar to learn the Best Practices to Have A Strong Cyber Security Incident Response.

Some recent news of cyber security incidents includes:

‘Big Line Holiday, a Hong Kong travel agency, revealed that hackers might have broken into its database and gained possession of some of its customers’ personal information.’
‘The city of Farmington is hit by a variant of the SamSam ransomware.’
‘Symantec researchers discovered a new malware strain, dubbed Android.Fakeapp, that sneakily spoofs Uber’s Android app and harvests users’ passwords, allowing attackers to take over users’ accounts.’
Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as appropriate, taking into account compliance recommendations?

Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement. Learn how to develop a CSIRT Policies, Program, Plan, Playbook, Training and Exercises.

Areas Covered in the Webinar:

Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
Outlining the critical actions to take if an event affects the company or its partners
Understanding an organizations’ susceptibility to a Cyber Attack
Cyber Incident Response: Getting started, research, training, testing and maintaining
Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA AND HITRUST

Who Will Benefit:

Information Security Managers
CEO, CIO, CFO, CSO
Technology Managers
Auditors
From Hospitals, Health Care Industries, Insurance Companies, Financial Firms
© 2024 World Conference Calendar. All rights reserved.