In today’s cybersecurity world, we can no longer hide behind the assumption that our business will never be compromised. We must change our mindset from wondering “IF” a compromise could occur, to “WHEN” it occurs. When that incident occurs, we as technology professionals must be ready to minimize the attackers’ intrusion and data theft patterns.
A cyber incident is no different than a physical bank robbery in terms of the seriousness of the crime. In a robbery crime scene investigation, evidence would be preserved, and a careful investigation would commence. It’s easy to confirm that things have been stolen during the robbery. In the case of a cyber incident, all too often we respond with intentions to eradicate it and get the systems back into production quickly to avoid downtime. Realistically, we need to enact our incident response plan and evaluate how we might have been robbed digitally.
Topics of Discussion Include:
- The seemingly insurmountable threat of cybercrime
- Core steps necessary for various incident types
- Special emphasis on phishing, malware, CATO, and unauthorized access incidents
- Forensic analysis procedures to better collect and evaluate evidence
- If security measures fail, you will learn the how-tos of:
- Internal communications
- Incident containment, eradication and recovery
- External communications
- Integration of forensics
- Insider threats
Date: September 17, 2019
Location: Hyatt Place - Topeka, KS
SBS Instructor: Buzz Hillestad, Senior Vice President, Information Security Consultant - SBS CyberSecurity
Hacker Hour webinars are a series of free webinars hosted by SBS CyberSecurity. Unlike paid webinars, Hacker Hours are aimed to meet on a monthly basis to discuss cybersecurity issues and trends in an open format. Attendees are encouraged to join the conversation and get their questions answered. SBS will also offer products and services to help financial institutions with these specific issues.