Security Congress Abstract
3011 - Cyber Resiliency Keys to Survive Post-Breach Scenario with Incident Response Planning
Wednesday, October 10
9:45 AM - 11:45 AM
Location: Floor 2 - Studio 3 & 4
This course will launch our students into a breathtaking view of a real world threat attack scenario of a startup company that has just been hacked. They go from cloud 9 having just launched a new payment services app that has skyrocketed them to jet-setting careers, to suddenly being the target of a series of threat vectors, only to be blindsided by yet another attack.
We take them through the war room, in a trial by fire scenario where they must rapidly identify the threat vectors, put together an incident response plan, Identify members of their CSIRT Team, and establish a communication plan which they action to all key stakeholders.
After each team presents their findings we will take them through an After Action Review (AAR) and explore what they did right and what they absolutely got all wrong. We explore the key Post-Breach risks, that if mis-calculated could cost them their business, their reputation, and have legal ramifications as well. Students walk away with a clear understanding of how to action a plan in their own organizations. Provide them with two key takeaways, critical to their survival in the new cyber age of evolution. This course is key to those who wish to establish a real and actionable Risk Mitigation Strategy, and stay out of jail, while being great stewards of their critical end user data.
- Identify Assets and determine their criticality
- Name the 10 Steps to the Incident Response Plan and put them into action
- Know the most important Post-Breach Risks and how to minimize them with a solid Communication Plan