How to Get Started with Cybersecurity Incident Response
Flip_flop_politics
Published on Apr 29, 2021
Shearwater’s Chief Technology Officer, Mark Hofman, shares his steps for building an Incident Response Plan to help you take control of a security incident.
Framed around the common and costly Business Email Compromise (BEC) attacks, Mark offers actionable tips on setting up an incident response process and validating your incident response plans.
You will learn about:
What defines an incident and why an incident response plan is crucial
Key elements required to set the scope and success factors of an incident response plan
How to assemble the incident response team, set up roles and delegate responsibilities
How to make sure your plan is current and will evolve over time
Your obligations under the Notifiable Data Breach scheme, privacy laws, and information security compliance requirements
If you’re interested in creating an incident response plan that protects your organisation, then this video is for you.
- Your Subscription
Flip_flop_politics -
Share Video
Add to
Flag Video
Rate video
Rate video
DISCLAIMER
The content presented in this stream and/or video may be satirical in nature for entertainment purposes. It may contain realistic scenarios that may include themes of racism, anti-semitism, anti-LGBT sentiment and even elements such as death threats, all purely in the context of parody. In addition, this content may depict or refer to acts of violence in a satirical manner. Shock factor is a common and deliberate element used in these displays to emphasise the satirical message. By continuing to view this content, you acknowledge that you understand the satirical nature of this content, including the depiction of violence and the use of shock factor, and agree that you will not use or interpret this content outside of its intended context. Please remember that humour and satire are complex; they are not intended to belittle or demean, but to engage and challenge social norms through exaggeration. If you have any concerns about content, please feel free to engage in constructive dialogue or report issues to GTV staff.
Up next
Recommended
-
01:56
Middle East largest cybersecurity conference opens in Dubai
182 views 742 days ago -
13:39
Australian Ports Hit By Cyberattack | DP World Australia | Cybersecurity
98 views 497 days ago -
11:14
Getting started with reloading - 10 things I wish I knew before I started reloading
570 views 1489 days ago -
00:01