“How to keep your Planes in the Air” –bouncing back quickly after a cyberattack
An important element of recovering from a cybersecurity incident is having in place a coordinated process for analysing, reporting, and remediating as quickly as possible after the attack. But manual investigations involve too much time and too many variables to constitute an adequate post-breach strategy.
Factors such as these, plus the need to gather data in a manner that will be defensible in a court of law, has given rise to fast-growing demand for robust post-breach response tools.
In this presentation, you’ll learn:
- What processes you should have in place before an attack
- Actions to take during and after the attack
- How to mitigate the impact of an attack