The registration period is from Jul 19, 2019 12:00 to Mar 18, 2020 12:00
Mitigating A Data Breach: Forensics & Incident Response - Details
Session Available from: Jul 19, 2019 12:00 to Mar 18, 2020 12:00

Session Options: Webinar, Recorded, Both Live/Recorded

Live Session Date: Sep 18, 2019

 
Add to calendar /education-events/discounted-webinar-sessions/event/1101/Mitigating-a-Data-Breach--Forensics-&-Incident-Response?Itemid860= 2019-09-18 14:00:00 2019-09-18 15:30:00 0 Mitigating a Data Breach: Forensics & Incident Response Mitigating a Data Breach: Forensics & Incident Response  Webinar ... - US - YYYY/MM/DD

Event description:

Mitigating a Data Breach:
Forensics & Incident Response

 Webinar OR Recorded Webinar + Free Digital Download

 Wednesday, September 18, 2019

12:00 pm – 1:30 pm Pacific

1:00 pm – 2:30 pm Mountain

2:00 pm – 3:30 pm Central

3:00 pm – 4:30 pm Eastern

As data breaches continue to make the headlines, financial institutions are challenged to maintain consumer confidence in their ability to recognize, react, and respond to intrusions to safeguard accountholder financial information and transactions. A core component of cybersecurity risk management is a well-designed incident response program that supports the institution’s needs. This session will summarize the latest information about cybersecurity risks and breaches and explore regulatory guidance and current practices, so institutions can define and manage an incident response program.

HIGHLIGHTS

  • Latest developments in ransomware attacks
  • Case studies and lessons learned from recent intrusions and breaches
  • Key risks and controls to mitigate and respond to breaches in Office 365
  • Aspects of the “cybersecurity kill chain”
  • Key strategies to test your incident response program
  • TAKE-AWAY TOOLKIT
    • Examples of cybersecurity incident response table-top exercise
    • Resources and examples to build an incident response program policy document
    • Resources and references for hardening and monitoring cloud services and applications
    • Employee training log
    • NEW – Interactive quiz

WHO SHOULD ATTEND?

This informative session is designed for IT and cybersecurity risk management staff, internal auditors, and individuals responsible for governance and oversight of the institution’s cybersecurity and incident response program.

DON’T MISS THIS RELATED WEBINAR!

Hacking the Weakest Link: The Role of Staff in Maintaining IT Security

on Tuesday, April 23, 2019

Please note:  The live webinar option allows you to have one internet connection (from a single computer terminal).  You may have as many people as you like listen and watch from your office computer.

 Susan Costonis      

ABOUT THE PRESENTER – Randall J. Romes, CliftonLarsonAllen LLP

Randy Romes has been a cybersecurity consultant at CliftonLarsonAllen since 1999 and brings a strong background in computer technology, physics, and education. As a Principal in the Information Security Services and Financial Institutions groups, Randy leads a team of technology and industry specialists and is responsible for the continuing development of the open-source, Unix, and Windows applications used in security audits.

Randy has been involved in developing numerous leading-edge hacking/testing methods and security service offerings. A featured speaker at national information and security management conferences, Randy holds multiple certifications, a Master’s in Educational Technology from the University of Saint Thomas, and a Bachelor’s in Education from the University of Wisconsin – Madison. In addition, he is an instructor at the Graduate School of Banking at the University of Colorado in Boulder.

THREE REGISTRATION OPTIONS

Note:  All materials are subject to copyright.  Transmission, retransmission, or republishing this webinar to other institutions or those not employed by your financial institution is prohibited.  Print materials may be copied for eligible participants only.

  1. LIVE WEBINAR

The live webinar option allows you to have one internet connection from a single computer terminal.  You may have as many people as you like listen and watch from your office computer.  Registrants receive a website address and passcode that allows entrance to the seminar.  The session will be approximately 90 minutes, including question and answer sessions.  Seminar materials, including instructions, passcode, and handouts will be emailed prior to the broadcast.  You will need the most current version of Adobe Reader available free at www.adobe.com. 

  1. RECORDED WEBINAR + FREE DIGITAL DOWNLOAD

Can’t attend the live webinar?  This option provides a recording of the live event, including audio, visuals, and handouts.  We even provide the presenter’s email address for follow-up questions. You will receive an email with the recorded webinar link, which can be viewed anytime 24/7, beginning 6 business days after the webinar.  You will also receive instruction on how to download a free digital copy of the webinar to your PC, which you may keep and use indefinitely.

The recorded webinar may ONLY be ordered for 6 months following the live webinar.  In addition, the download must be completed within 6 months of the live webinar date. 

  1. BOTH LIVE WEBINAR & RECORDED WEBINAR + FREE DIGITAL DOWNLOAD

Options 1 and 2 described above.

 AFFORDABLE, PROFESSIONAL TRAINING, WHEN AND WHERE YOU CHOOSE