For full functionality of this site it is necessary to enable JavaScript. Here are the instructions how to enable JavaScript in your web browser.

CYBER SECURITY INCIDENT RESPONSE IS AN ESSENTIAL PART OF YOUR BUSINESS CONTINUITY PROGRAM

Michael C. Redmond is Keynote Speaker at Ijona Skills. She is consults and audits in the areas of Cyber/Information Security,, Organizational Resilience, Business Continuity, Disaster Recovery, High Availability, HIPAA and ISO. Some of her past clients include Fidelity, JP Morgan Chase, Emblem Health. Excellus Blue Cross, and many more. Education; MBA PhD Certifications MBCP, FBCI, CEM, PMP Certified as Lead Implementer; ISO/IEC 27001 Information Security Management ISO/IEC 27032 Lead Cyber Security Manger ISO/IEC 27035 Security Incident Response ISO/IEC 22301 Business Continuity Management Sy........

Read More

Overview

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.
Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as
appropriate, taking into account compliance recommendations?
Establish Key Performance Indicators (KPI) to determine if your Information Syestems Incident Response program meets business objectives and operational metrics for ongoing process
improvement. We will discuss how to tailor & enhance your existing security training program and requirements for specific audiences based on the sensitivity of the information for which they are granted based on policies.
How to strengthen IT Risk Management - Integrate Information Security risk management with enterprise risk management, including using common business terminology, congruent methods, and common or linked
risk register, and establishing mechanisms for risk acceptance. How to build an IS regulation review process, schedule and regulation requirements.

Why should you attend?

Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures?

Risk Management Monitor quoted Vincent Weafer, Senior Vice President of McAfee Labs, "The year 2014 will be remembered as 'the Year of Shaken Trust,'" said Vincent Weafer, senior vice president of McAfee Labs. "This unprecedented series of events shook industry confidence in longstanding Internet trust models, consumer confidence in organization's abilities to protect their data, and organization's confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data."

Areas Covered in the Session:

Key points to be discussed at the session include:

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
  • Outlining the critical actions to take if an event affects the company or its partners
  • Understanding an organization's susceptibility to a Cyber Attack
  • Cyber Incident Response: Getting started, research, training, testing and maintaining 
  • Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005. NIST, FFIEC, HIPPA AND HITRUST

Who can Benefit:

  • Information Security Managers
  • CEO, CIO, CFO, CSO
  • Technology Managers
  • Auditors

Webinar Id: ISFMR001

Duration: 90 mins

Ratings:
No reviews yet!!

   

Refund Policy

Webinars of Michael C. Redmond
Disaster Recovery Planning on Shoestring Bu...
Presenter: Michael C. Redmond

View Anytime
Price: $167
Status: Archived

Designing Full Cyber Security Incident Resp...
Presenter: Michael C. Redmond

View Anytime
Price: $167
Status: Archived

Webinars of Information Technology
Behavior Based Safety Analysis.
Presenter: Keith Warwick

View Anytime
Price: $167
Status: Archived

Cyber Security Incident Response (CSIRT)
Presenter: Michael C. Redmond

View Anytime
Price: $167
Status: Archived


top