The time to make a data breach response plan is before a breach occurs. After a breach is not the time to discover that you didn't collect the right logs, don't know how to contact your emergency incident response team, and have a lot of surprise costs you didn't budget for.
Of course, developing a plan is easier said than done. Luckily, Dark Reading is here to help. Join us today, Jan. 26, for a Dark Reading Virtual Event on the topic of Cybersecurity: The Business View, from 11 a.m. to 5 p.m. Eastern Time, and pay special attention to the panel discussion "Preparing Your Business For A Major Data Breach," at 2:45 p.m.
Your moderator for the panel will be yours truly, and our guests will be John P. Gelinne, Captain, US Navy (Ret), and director of Deloitte Advisory Cyber Risk Services; John H. Sawyer, managing security consultant, InGuardians; and Roman Brozyna, chief information security officer of Bit9.
The very word "breach" may spur a string of questions for other business leaders, such as:
- How can I make sure I detect security incidents quickly? Where should I be looking for indicators of compromise?
- Do I really have to collect a million logs? What are the most important pieces of information forensic investigators will want me to provide, and how do I make sure I collect it appropriately and don't destroy it by mistake?
- How do I know when it's the right time to contact law enforcement, and how do I know who to contact?
- What liability issues do I need to be aware of after a data breach? It goes way beyond breach notification laws, doesn't it?
- What hidden costs will my company incur while responding to a data breach?
- Besides the chief information security officer, who else in my company plays an essential role in data breach response? When is the right time to include them in the planning?
- Is the cyber insurance industry mature enough yet to make it a worthwhile investment?
- Who should be calling the shots in the wake of a data breach?
- What are the do's and don't's for public relations in the wake of a breach? Which breached organizations have done PR really well and which have done it really poorly?
Join us at 2:45 p.m. Eastern Time to get answers to these questions and more. Better yet, join us at 11:00 a.m. Eastern Time and make sure you don't miss a single minute of this Dark Reading Virtual Event. Register now.
Related Content:
- Cybersecurity: The Business View (Click to register)
- Measuring Real Risk: The Business View
- How (And Why) Attackers Target Your Business