There is one nightmare day that all IT and cybersecurity professionals dread: the discovery of a critical data breach. It’s potentially one of the most impactful – yet least predictable — days that your business will face. And, to a large extent, that impact will be determined by the decisions you make next.
For the most experienced and effective cybersecurity teams, though, that “really bad day” doesn’t come as a surprise. Such teams prepare for security incidents with tools for early detection and processes for incident response. Just as emergency first responders know how to handle a fire or a hurricane, cybersecurity first responders know what to do in the event of a major data compromise. Is your team ready? You can find out by attending Dark Reading’s June 17 event: Preparing For, Detecting, and Managing a Critical Data Breach.
Attend and you’ll learn
Preparing for, Detecting, and Managing a Critical Data Breach
Join us for a free, all-day online conference produced by the editors of Dark Reading – will help you and your cybersecurity team lay down the groundwork for a mission-critical data breach. You’ll get insight on the steps you can take today to ready your enterprise for a cyber compromise – including the best methods for building and rehearsing a breach response program. You’ll get firsthand insight on how to build incident response programs that work, even in the face of an all-out cyber attack. And you’ll get advice on how to minimize the impact of a critical breach, and how to begin remediation as quickly as possible.
Among the topics that will be covered:
- Tools and best practices for detecting a breach, even when it’s well-obfuscated
- Methods for limiting the scope and impact of a data breach
- How to determine the extent of a breach, and what system/partners may be affected
Explore strategies for speeding the remediation process.
Discover how to limit costs and liabilities associated with cyber breaches.
Lessons learned: how to monitor and collect data on future threats.
Join us for a full-day virtual event on tools, technologies, and processes for ensuring the cybersecurity of your enterprise’s most sensitive information.
Agenda at at glance
There are many plans and guidelines for handling a critical data breach – but there’s no substitute for real-life experience. In this practical, real-world keynote, a top expert with firsthand knowledge of data breach incidents offers a detailed look at how an incident can be detected, how your team should respond, and how to optimize remediation while minimizing the long-term impact. You’ll get tips, advice, and recommendations from an expert who has firsthand understanding of breaches and their potential impact.
A data breach may affect not only your organization’s IT environment, but employees, customers, and the business itself. An effective response requires advance preparation. In this instructive keynote, a top expert will describe key elements of data breach response, including assessment of threat intelligence, analysis of security system telemetry, coordination of incident response teams, and how to communicate with top executives, users, customers, and the general public. You’ll get insight on how to prepare for the most likely attacks, as well as how to build and rehearse a breach response team.
Without public Indicators of Compromise (IoCs) or open-source intelligence available, targeted cyber-attacks are incredibly difficult to detect. However, in March of this year, a series of advanced attacks that targeted US and European companies were autonomously detected, and later attributed to Chinese cyber espionage group APT41.
Join Justin Fier, Darktrace’s Director for Cyber Intelligence & Analytics, as he explains how AI technology was able to identify how APT41 attempted to gain access to different companies in fast-moving attacks that exploited the Zoho ManageEngine zero-day vulnerability.
Watch this webinar to discover:
– How APT utilized the window of opportunity before IT systems were patched
– How Cyber AI Analyst autonomously investigated the attacks as part of a meaningful security narrative
– The implications of attacks within a supercharged threat landscape
Strong IAM governance is the key to preventing data breaches and limiting the blast radius should a security incident occur. Join James Martin, Technical Product Manager, and Chris Hertz, VP Cloud Security Sales, of DivvyCloud by Rapid7, for a discussion on why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations are governing cloud IAM to reduce risk and the chance of a data breach.
Key takeaways include understanding how to:
- Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
- Establish and maintain least privilege.
- Limit cloud security blast radius.
For some unfortunate organizations, the time between a cyber intrusion and the detection of that intrusion can be days, weeks, or even months. How can enterprises build a security environment that enables them to detect potential compromises sooner? In this panel discussion, experts will discuss the various ways to detect cyber attacks and breaches, and they will offer insight on how to shorten the time it takes to identify a potential compromise.
IT and cybersecurity teams are rapidly building out their security operations center (SOC) and incident response (IR) programs in order to identify potential security vulnerabilities or compromises and respond to them as quickly as possible. But how can you ensure that your SOC and IR programs are working effectively? In this panel discussion, experts outline some of the key elements behind security operations and incident response, and how you can equip and prepare your teams to act effectively in the event of a major breach.
When it comes to cyber breaches, much of the discussion is around first response and how to minimize the damage caused by an online attack. But what about fixing the issues that caused the breach in the first place? In this panel discussion, experts discuss the practical processes and tools that can be implemented after a breach is discovered and diagnosed. You’ll learn how to determine the extent of a security compromise, and how to trigger the right steps toward fixing your organization’s vulnerabilities and repairing the damage caused by a cyber attack.
More to Come
Take A Tour
Explore the environment from a previous Dark Reading Virtual Event. View the slideshow to get an insider look at these key spaces in this virtual event, prior to attending:
Lobby: Navigate your way around the show floor.
Zones: Resource repositories curated by our editors & industry experts.
Auditorium: View live keynotes, panels, and webinar sessions.
Help Desk: Receive 1:1 assistance and the day’s program/agenda.
If you want to know more about how to handle a major data breach – including steps you can take today to limit the impact of a compromise tomorrow – then this virtual event is for you. Register today!