eCourse
Preparing for a Cyber Attack: Anatomy of an Attack and Incident Response Table Tops
Contains material from Jul 2022
Technical Questions?
512.475.6700
service@utcle.org
Session 2: Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top - Learn the importance of practicing the scenario of a cybersecurity incident, and how to effectively execute a table top in order to be better prepared to respond through best practices.
Includes: Video Audio Slides
- Total Credit Hours:
- 1.00
- Credit Info
- TX, CA
- TX MCLE credit expires: 8/31/2024
Preview Sessions
Show session details
Megan M. Kayo
Download session materials for offline use
Session 1
—29 mins
0.50
The Anatomy of a Cyber Attack (Jul 2022)
Cyber attacks have become an everyday reality for companies. But exactly how are hackers compromising companies? From vishing to cookie stealing, credential stuffing to SQL injections, this presentation takes you through a rundown of techniques that have resulted in some of the biggest hacks of companies.
Originally presented: May 2022 Technology Law Conference
Megan M. Kayo,
Wilson Sonsini Goodrich & Rosati, P.C. - San Francisco, CA
Show session details
Ankur Sheth
Download session materials for offline use
Session 2
—28 mins
0.50
Incident Response Table Tops: Best Practices for Planning and Executing Your Next Table Top (Jul 2022)
Learn the importance of practicing the scenario of a cybersecurity incident, and how to effectively execute a table top in order to be better prepared to respond through best practices.
Originally presented: May 2022 Technology Law Conference
Ankur Sheth, MBA, CISSP, CISM,
Ankura Consulting Group - New York, NY