Cyber Security Incident Response (CSIRT)


Michael C. Redmond is Keynote Speaker at Compliance key Inc. She is consults and audits in the areas of Cyber/Information Security,, Organizational Resilience, Business Continuity, Disaster Recovery, High Availability, HIPAA and ISO. Some of her past clients include Fidelity, JP Morgan Chase, Emblem Health. Excellus Blue Cross, and many more. Education; MBA PhD Certifications MBCP, FBCI, CEM, PMP Certified as Lead Implementer; ISO/IEC 27001 Information Security Management ISO/IEC 27032 Lead Cyber Security Manger ISO/IEC 27035 Security Incident Response ISO/IEC 22301 Business Continuity Managem........

Overview

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.
Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them asappropriate, taking into account compliance recommendations? 
Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement.
Learn how to develop a CSIRT Policies, Program, Plan, Playbook, Training and Exercises.

Why should you attend this webinar?

Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures?
Three years ago, Risk Management Monitor quoted Vincent Weafer, Senior Vice President of McAfee Labs, "The year 2014 will be remembered as 'the Year of Shaken Trust,'" said Vincent Weafer, senior vice president of McAfee Labs. "This unprecedented series of events shook industry confidence in longstanding Internet trust models, consumer confidence in organization's abilities to protect their data, and organization's confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2017 requires stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data."

Areas Covered in the Session:

Key points to be discussed at the session include:

Who can Benefit:



Webinar Id: CIFMR004

Training Options:

Duration: 60 mins

 View anytime

 Recorded: [Six month unlimited access]

 $167 (Single Attendee)  $599 (Unlimited Attendee)

Refund Policy
Past Webinar of Michael C. Redmond
Business Continuity Management....
Presenter: Michael C. Redmond
6 months unlimited
Price: $167
Auditing Information Security ....
Presenter: Michael C. Redmond
6 months unlimited
Price: $167

More Webinar

Upcoming Webinar: Cross Industry Functions
Advanced HR Audit Techniques
Presenter: Ronald Adler
When: 05/31/2018 | 12:30 PM PT |03:30 PM ET
Price: $179
Flexible Work Arrangements
Presenter: Susan Fahey Desmond
When: 06/01/2018 | 12:30 PM PT |03:30 PM ET
Price: $179

More Webinar

Past Webinar: Cross Industry Functions
Complying with the Fair Labor ....
Presenter: Susan Fahey Desmond
6 months unlimited
Price: $167
Complying with Federal and Sta....
Presenter: Matthew W. Burr
6 months unlimited
Price: $167

More Webinar

PayPal logo   PayPal Verified logo   godaddy logo
Copyright © 2018 Compliance Key. All Rights Reserved. Back to Top