eCourse art

eCourse

Cybersecurity: Important Lessons in Breach Response

Contains material from Nov 2017

Cybersecurity: Important Lessons in Breach Response
4.32 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

interesting

Technical Questions?
512.475.6700
service@utcle.org



Data breach trends in 2017 show an increased sophistication of malware, increased targeting of corporate human resources information (W-2 and other personnel information), unique combinations of social engineering and technical subterfuge to acquire sensitive data for criminal monetization, and malicious damage caused by encryption attacks. It is increasingly difficult for businesses to protect their digital environment, and it is more important than ever before to plan for the inevitable. Hear some lessons learned from years of experience in this area, with an emphasis on proactive approaches to data security, including thorough preparation and a rapid response.

Includes: Audio Paper Slides


Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions

Show session details

1. Cybersecurity: Important Lessons in Breach Response (Nov 2017)

Sean B. Hoar, Allen Burzen, Shamoil T. Shipchandler, J. Andrew Valentine

1.00 0.50 0.00
Preview Materials

Download session materials for offline use

(mp3)
59 mins
Paper
(pdf)
6 pgs
Paper
(pdf)
5 pgs
(pdf)
23 pgs
Session 1 —59 mins
Cybersecurity: Important Lessons in Breach Response (Nov 2017)

Data breach trends in 2017 show an increased sophistication of malware, increased targeting of corporate human resources information (W-2 and other personnel information), unique combinations of social engineering and technical subterfuge to acquire sensitive data for criminal monetization, and malicious damage caused by encryption attacks. It is increasingly difficult for businesses to protect their digital environment, and it is more important than ever before to plan for the inevitable. Hear some lessons learned from years of experience in this area, with an emphasis on proactive approaches to data security, including thorough preparation and a rapid response.

Originally presented: Oct 2017 Government Enforcement Institute

Sean B. Hoar, CISSP, GISP, CIPP/US, Partner and Chair, Data Privacy & Cyber Security Practice, Lewis Brisbois - Portland, OR
Allen Burzen, Referral Partner Manager, AllClear ID - Austin, TX
Shamoil T. Shipchandler, Regional Director, Fort Worth Regional Office, U.S. Securities and Exchange Commission - Fort Worth, TX
J. Andrew Valentine, Associate Managing Director, Cybersecurity and Investigations, Kroll - Dallas, TX