Preparing for, Detecting, and Managing a Critical Data Breach
Event submitted on Wednesday, June 17th 2020, approved by Charles Villanueva ✓
Stay Safe, Stay Strong and we'll see you on the other side. Your friends at InfoSec Conferences.
This event has been tagged as follows:
This is definitely an interesting event. Organized by the institution within the Information Security community, DarkReading, this event covers a bunch of interesting and highly useful actionable items that are applicable to any Cybersecurity practitioner. The subject matter that this online InfoSec event, which is being beamed in from London, UK, includes the best hacking tools and practices in using those tools to detect a breach. The talk will also examine possible methods to limit the scope and impact of a data security breach should it occur. Understanding the depth of the security breach is also vital and will be discussed. All in all, an event certainly worth attending. We wish the team at DarkReading the best of luck organizing this event.
The following description was either submitted by the Conference Organizer on Wednesday, June 17th 2020, or created by us.Add this conference to your favourites
The discovery of a critical data breach is considered as one of the nightmare days that all IT and cybersecurity professionals dread. It’s potentially one of the most impactful – yet least predictable — days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.
For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response.
Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.