Training

Incident & Breach Response , Security Operations

Breach Response Planning: Hammer Out Your Legal, Business and Technology Differences, Before a Breach

Breach Response Planning: Hammer Out Your Legal, Business and Technology Differences, Before a Breach

Every mature enterprise understands the necessity of a maintaining a tested breach-response plan. But it's critical that the scope of this plan covers all interested parties, not just technical operations, such as legal, finance and media relations that may have greatly different priorities at crunch time.

Hear the perspectives of key stakeholders - the practitioners who represent legal, IT and business operations, and whose organizations have suffered severe data breaches. Learn from them:

  • The roles each stakeholder plays in crafting and testing the plan;
  • What changes when the breach is real and it's time to put the plan in action;
  • Lessons learned from their own breach experiences.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.