Creating an Incident Response Program That Actually Works When You Need It
Thursday, Oct 5 @ 1:00 pm ET
Recent major cyber security incidents have highlighted the fact that organizations don’t just need incident response plans, they need plans that work. In this webinar, we will discuss:
- Two different models for creating or growing your incident response team
- Balancing perspectives on an incident: risk, legal, operations, information security, and corporate communications
- The key characteristics of a good incident response plan: brief, clear, resilient, and living
Maturing Your Security Program: Establishing a Cyber Program Office
Thursday, Oct 12 @ 1:00 pm ET
Most cybersecurity teams add new tools and processes on top of their current responsibilities, often leading to stagnation and ineffective investment of scarce resources. In this webinar, we will discuss:
- How to assess and define current capabilities, effectiveness and maturity to create a desired end-state
- Creating a plan to guide you to your cybersecurity goals
- Promoting a security-first culture of continuous improvement
Managing Privileged Access to Systems and Data
Thursday, Oct 19 @ 1:00 pm ET
Lack of control over privileged access to systems and data represents a significant risk to almost every organization. In this webinar, we will discuss:
- Key requirements to protect privileged accounts
- Strategies to help organizations gain better control over privileged accounts
- Establishing effective Privileged Access Management (PAM) programs
The Vulnerability Landscape: A Look Back On The Past 10 Years
Thursday, Oct 26 @ 1:00 pm ET
Protiviti’s cybersecurity experts have performed numerous security scans to test and assess IT systems and infrastructure for cybersecurity risks. In this session, we will share the key vulnerability and threat discoveries in our data, including:
- Most common digital threats and vulnerabilities
- Cyber threat trends that organizations are most likely to face based on industry, size, and other views
- Insights on the most frequently perpetrated cybercrimes as well as the recent acceleration of attacks
Comments are closed.