eCourse art

eCourse

Preparing for a Cyber Attack: Anatomy of an Attack and Incident Response Table Tops

Contains material from Jul 2022

Preparing for a Cyber Attack: Anatomy of an Attack and Incident Response Table Tops
5 out of 5 stars
What was the overall quality of the course (presentation, materials, and technical delivery)?
Rate the overall teaching effectiveness and presentation skills of faculty for the course.
How would you rate the value of the materials provided as part of the course?

Technical Questions?
512.475.6700
service@utcle.org



Session 1: The Anatomy of a Cyber Attack - Cyber attacks have become an everyday reality for companies. But exactly how are hackers compromising companies? From vishing to cookie stealing, credential stuffing to SQL injections, this presentation takes you through a rundown of techniques that have resulted in some of the biggest hacks of companies.  

Session 2: Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top - Learn the importance of practicing the scenario of a cybersecurity incident, and how to effectively execute a table top in order to be better prepared to respond through best practices.

Includes: Video Audio Slides

  • Total Credit Hours:
  • 1.00
  • Credit Info
  • TX, CA
  • TX MCLE credit expires: 8/31/2024

Preview mode. You must be signed in, have purchased this eCourse, and the eCourse must be active to have full access.
Preview Sessions
Credit

Show session details

1. The Anatomy of a Cyber Attack (Jul 2022)

Megan M. Kayo

0.50 0.00 0.00 0.50
Preview Materials

Download session materials for offline use

(mp4)
29 mins
(mp3)
29 mins
(pdf)
13 pgs
Session 1 —29 mins
0.50
The Anatomy of a Cyber Attack (Jul 2022)

Cyber attacks have become an everyday reality for companies. But exactly how are hackers compromising companies? From vishing to cookie stealing, credential stuffing to SQL injections, this presentation takes you through a rundown of techniques that have resulted in some of the biggest hacks of companies.   

Originally presented: May 2022 Technology Law Conference

Megan M. Kayo, Wilson Sonsini Goodrich & Rosati, P.C. - San Francisco, CA

Show session details

2. Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top (Jul 2022)

Ankur Sheth

0.50 0.00 0.00 0.50
Preview Materials

Download session materials for offline use

(mp4)
28 mins
(mp3)
27 mins
(pdf)
10 pgs
Session 2 —28 mins
0.50
Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top (Jul 2022)

Learn the importance of practicing the scenario of a cybersecurity incident, and how to effectively execute a table top in order to be better prepared to respond through best practices.

Originally presented: May 2022 Technology Law Conference

Ankur Sheth, MBA, CISSP, CISM, Ankura Consulting Group - New York, NY