The worst has happened. Online attackers have penetrated your cyber defenses and are threatening your most sensitive data. What should you do now? In this fascinating and educational virtual event, you will hear advice and recommendations from some of the cybersecurity industry’s top experts and speakers on the critical issues of breach investigation and incident response.
Attend and you’ll learn
Prepare for 2020
This all-day online conference, produced by the editors of Dark Reading, will help you and your organization prepare for those “very bad days” when you suspect that your mission-critical data has been compromised. Attend the event and you’ll:
- Hear about tools and best practices for detecting a breach – even when it’s well-obfuscated
- Learn how to analyze multiple indications of compromise to reveal a sophisticated attack
- Receive first-hand expertise on what to do in the first hours of a major breach, whether to pull the plug on infected systems, and when to call in law enforcement
- Get expert advice on how to determine the extent of a data compromise, how to stop it, how to remediate your systems, and how to handle legal and business consequences that may follow
Build a thorough process for system remediation, including partner and service provider environments
Be ready for the aftermath: legal liabilities, cyber insurance, and restoring customer/user confidence
Collect and apply knowledge from data compromises to improve your enterprise defenses
Join us for a full-day virtual event on detecting cyber breaches and implementing incident response.
Agenda at at glance
We’ve all seen the headlines – another organization has been hacked, disclosing sensitive business information. But in most cases, that breach began months, even years before the headlines. In this unusual keynote address, you’ll hear about the full lifecycle of a data breach – from its conception by cybercriminals to its detection by the victim organization to its resolution by security and incident response teams. Get an insider’s view of a critical data compromise – and the lessons it teaches about how to defend your own enterprise data.
To effectively handle a major data compromise, you must build a plan in advance. How will the incident be detected? Who will handle first response? How will you stop the attack and repair the damage, and how will you inform those who might be affected? In this informative session, a top expert on cyber incident response will offer a roadmap for developing an effective incident response initiative. You’ll learn about the tools and processes needed for early detection, breach investigation, and system remediation. You’ll also get insight on who should be involved in an IR program, and how to rehearse your team – before they face the real thing.
Experts agree: the damage caused by a major data breach depends heavily on the decisions made in the first 24 hours after its discovery. How is the compromise detected? Should the affected systems be taken offline? Should service providers and business partners be called in to help? Should law enforcement be notified? In this fascinating session, a panel of experienced cyber first responders discuss how successful organizations have minimized the damage by making the right decisions in the initial hours of an online attack. You’ll also get a look at the pitfalls that enterprises encounter in those first 24 hours, and how the wrong choices can make the effects of a data breach significantly worse.
To limit the damage caused by a cyber compromise, your team must quickly be able to analyze and predict its potential effects. What is the extent of the compromise, and what downstream systems (or business partners) could it affect? Once inside your network, what lateral moves could an attacker make, and how can you limit them? Most importantly, how can you quickly remediate all associated systems to keep the damage at a minimum? In this panel discussion, top security analysts and experts offer advice on how to determine the extent of a data breach, how to limit its impact, and how to prevent that same attack from happening again.
The worst is over. Your organization has detected an online compromise, determined the damage, stopped the attackers, and repaired the affected systems. But you’re not out of the woods yet. What legal liabilities might your organization face as the result of the breach? Should you file a cyber insurance claim? What steps should you take to ensure that a similar breach doesn’t happen again – and how can you assure customers and business partners that you have taken those steps? In this panel session, you’ll get insight on the long-term impacts of data breaches – including the technical, legal, and financial steps your organization may need to take. You’ll also get recommendations on how to reduce the impact of a major breach, and how to shore up your systems and processes to prevent future compromises.
We’ve all seen the headlines – another organization has been hacked, disclosing sensitive business information. But in most cases, that breach began months, even years before the headlines. In this unusual keynote address, you will get a better understanding of what is behind a data breach – particularly the extent to which cyber attackers can exploit software flaws and vulnerabilities. Get an insider’s view of a critical data compromise – and the lessons it teaches about how to defend your own enterprise data. You will leave the session understanding how to identify and address risk factors, how attackers exploit vulnerabilities & the extent to which organizations rely on Application Security to secure the SDLC.
Organizations need tools to link intelligence about threats in the wild, threats in your network, and understand unique signals from both. Without the ability to find the bad guys in your network, security teams are unable to be effective in their roles. At RSA 2019, Chronicle, an Alphabet company, launched Backstory, a global security telemetry platform designed for a world that thinks in petabyte. In this webcast, learn how Chronicle is looking to solve these far too common security challenges at scale, with a focus on speed and efficacy with this new security intelligence platform. You’ll also experience a demo of Backstory and see what’s new and what’s next.
More to Come
Take A Tour
Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:
Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.
If you want to know more about the do’s and don’ts associated with incident response, as well minimizing the time and cost associated with a major data breach, then this virtual event is for you. Register today!