The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.
Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as appropriate, taking into account compliance recommendations?
Why should you Attend:
Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures?
Risk Management Monitor quoted Vincent Weafer, Senior Vice President of McAfee Labs, "The year 2014 will be remembered as ‘the Year of Shaken Trust,'" said Vincent Weafer, senior vice president of McAfee Labs. "This unprecedented series of events shook industry confidence in longstanding Internet trust models, consumer confidence in organizations' abilities to protect their data, and organizations' confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data."
Areas Covered in the Session:
Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
Outlining the critical actions to take if an event affects the company or its partners
Understanding an organizations' susceptibility to a Cyber Attack
Cyber Incident Response: Getting started, research, training, testing and maintaining
Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005. NIST, FFIEC, HIPPA AND HITRUST
Who Will Benefit:
Information Security Managers
CEO, CIO, CFO, CSO
Ms. Michael Redmond She is a Consultant, Speaker and Author. Michael also conducts ISO Certification Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. Michael is certified as a Lead Implementer in ISO 27001 Information Security Management, ISO 27035 Security Incident Response, ISO 22301 Business Continuity Management and ISO 21500 Project Management. She is a Certified Instructor for ISO Certification Courses through PECB. Also certified Project Manager PMP, and 2 Master Certifications (MBCP) (FBCI) in Disaster Recovery and CEM Emergency Management.
Compliance4All DBA NetZealous,
Event Link : http://bit.ly/29HPxTO
Twitter Follow us – https://twitter.com/compliance4all
Facebook Like us – https://www.facebook.com/Compliance4all
Pinterest - https://in.pinterest.com/compliance4all/
Contact the event managers listed below for more information about how you can participate at the Online Webinar on How to do a Cyber Security Risk Assessment in September.
|Conference/Event Dates:||09/26/2016 - 09/26/2016|
|Conference/Event Hours:||60 Minutes|
|Primary Industry:||Education Events|
|Other Industries:||Education, Education Events|
|Cost to Attend:||One Dial-in One Attendee Price: US$150.00|
|Audience:||One Dial-in One Attendee
|Number of Exhibitors:||1|
|Show Manager:||Event Manager|
|Exhibitor Prospectus:||Click Here|
|Booth Size||Booth Cost||Available Amenities|
|Please Contact Compliance4all for Information||Electricity:||n/a|
|Marketing Vehicles Allowed:||n/a|
|Other Booth Sizes Available: n/a|
How do I show up here?
Add a note here, it is only visible by you.