ComplianceOnline

Cyber Security Incident Response Program

Instructor: Michael C Redmond
Product ID: 704631
  • Duration: 60 Min
Purchase option for this webinar is currently unavailable. Please contact our Customer Care for more info.

Customer Care

Fax: +1-650-963-2556

Email: customercare@complianceonline.com

Read Frequently Asked Questions

This cyber security training program will assess the strength of the procedures your organization has in place to deal with a breach, malware and more. It will highlight the risk you are vulnerable to and discuss adopting a systematic approach to risk tracking to enhance the effectiveness of your cyber security incident response program.

Why Should You Attend:

An efficient incident response program allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.

Information security, governance and risk are all critical aspects of planning and executing the information security plan. Who in your organization has the key responsibility to develop an information security governance program?

This webinar will review existing information security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them as appropriate, taking into account compliance recommendations. The program will also discuss:

  • Establishing Key Performance Indicators (KPI) to determine if your information systems incident response program meets business objectives and operational metrics for ongoing process improvement.
  • How to tailor and enhance your existing security training program and requirements for specific audiences based on the sensitivity of the information for which they are granted based on policies.
  • How to strengthen IT risk management - Integrate information security risk management with enterprise risk management, including using common business terminology, congruent methods, and common or linked.
  • Risk register and establishing mechanisms for risk acceptance.
  • How to build an IS regulation review process, schedule and regulation requirements.

Areas Covered in the Webinar:

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the cyber incident program
  • Outlining the critical actions to take if an event affects the company or its partners
  • Understanding an organizations’ susceptibility to a cyber attack
  • Cyber incident response - getting started, research, training, testing and maintaining

Who Will Benefit:

  • Information Security Managers
  • CEO, CIO, CFO, CSO
  • Technology Managers
  • Auditors

Instructor Profile:

Dr. Michael C. Redmond, PMP, CEM, FBCI, MBCP, MBA, PhD, is CEO of Redmond Worldwide, and ISO certified and certified as a trainer by PECB. She has consulted in the area of cyber security for such firms as Fidelity, Excellus Blue Cross, and Lifetime Healthcare Companies.

As a cyber security subject matter expert, advisor, and consultant, she has improved incident management processes by defining the business requirements for a regulatory reporting and reviewing the current policy and procedures to identify gaps and close those gaps. She is responsible for meeting all best practices, including NIST (National Institute Standards and Technology), ISO 27001, Cobit 4.1 and 5 in planning, testing and documenting.

She served as an adjunct professor for emergency management and business continuity management at New York University and the Master’s program at John Jay College. She served on the Boards of the New York Chapter for Association of Contingency Planners, Contingency Planners Association and NY Chapter of the Communications & Electronics Association. Currently, she is responsible for event speakers for the Western NY Chapter of ACP.

Ms. Redmond is an author, an international speaker and trainer. She recently spoke in Nigeria and was endorsed by Gen Yakubu Gowon, Past Head of State. She served as the attaché to Chile for a special project at the request of the President of Chile. Ms. Redmond trained agencies for the New York City Department of Health and Mental Health on Continuity of Operations Training. She recently spoke in Angola and has trained over 50 corporations.

Topic Background:

Risk Management Monitor quoted Vincent Weafer, senior vice president of McAfee Labs. “The year 2014 will be remembered as ‘the Year of Shaken Trust,’” said Mr. Weafer. “This unprecedented series of events shook industry confidence in longstanding Internet trust models, consumer confidence in organizations’ abilities to protect their data, and organizations’ confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust in 2015 will require stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data.”

Follow us :
ComplianceOnline Banking Summit 2016 | Risk Management and Data Security - 80390SEM
ComplianceOnline Medical Device Summit 2017

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed
    Loading