Creating a Cyber Incident Response Program that Works


Tuesday, January 29, 2019   |   10:00 AM PST | 01:00 PM EST   |   Duration: 60 Minutes      

Live

One Dial-in One Attendee

Price: US$150.00


Corporate Live

Any number of participants

Price:US$290.00


Duration: 60 Minutes  

Recorded

Access recorded version,
only for one participant ?

Price: US$190.00

Corporate Recorded

Access recorded version,
Any number of participants ?

Price: US$390.00

In this webinar you will Learn how to develop a CSIRT Policies, Program, Plan, Playbook, Training and Exercises, And We will cover table top tests, table top exercises, full Red Team Blue team training.
Ms. Michael Redmond   Product Id : 502341
  Instructor : Ms. Michael Redmond

  More Trainings by this Expert


Overview:

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.

Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program.

review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them asappropriate, taking into account compliance recommendations?

Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement.

Learn how to develop a CSIRT Policies, Program, Plan, Playbook, Training and Exercises

Why should you Attend: Is your Cyber security Incident Response team trained to respond in an Incident? Many organizations thought they were and then the results proved otherwise.

Are you willing to risk your Business Reputation on their training?

Coordination of incident handling stops duplication of effort. Training should concentrate not only on the capability to react to incidents but the ability to utilize the resources to alert and inform its stakeholders.

We will cover table top tests, table top exercises, full Red Team Blue team training. Playing the role of an attacker can make your team better at defense.

Many companies exercises do not using formal blue teams. This is an effective way to have a more realistic idea of their true defensive capabilities. Exercises do not have to be expensive. There are so many types of tests.

Areas Covered in the Session:

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
  • utlining the critical actions to take if an event affects the company or its partners
  • Understanding an organizations' susceptibility to a Cyber Attack
  • Cyber Incident Response: Getting started, research, training, testing and maintaining
  • Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA AND HITRUST

Who Will Benefit:
  • Information Security Managers
  • CEO, CIO, CFO, CSO
  • Technology Managers
  • Auditors


Speaker Profile
Ms. Michael Redmond is a Consultant, Speaker and Author. She also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.

Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management

She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:

SIEM Security information and event management which is Combining software products and services combining security information management (SIM) and security event management (SEM).

(CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.

Audit of CSIRT programs and documentation.

Information Security Programs and Implementation.

She has 2 books which are coming out in 2016 and are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery book Michael has a series of Audio Training that receive CEU's from Disaster Recovery Institute (DRI) and other certifying organizations.

They are: Cyber Security Training for - 6 CEU's. Business Continuity Management for 20 CEU's. www.rwknowledge.com Michael's been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation. She has recently been named on the list of "Women of Distinction for 2015" by Women of Distinction Magazine for her work in Cyber Security. She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as: International ISSA Conference in Chicago. NYS Cyber Security Conference - Co Spoke with Acting CISO for New York State. ISACA Western New York Conference. Metric Stream Round Table in New York City.




Your Recently Viewed Webinars

Payment Methods

Contact Us

NetZealous LLC,
161 Mission Falls Lane, Suite 216,
Fremont, CA 94539, USA.

Information

  Refund Policy
  +1-800-447-9407
  support@compliance4All.com