Training

How to Succeed at Breach Response
How to Succeed at Breach Response

Get up to speed on the dos and don'ts of breach response. Plus, have a little fun along the way, as Mike Bruemmer, Vice President of Experian® Data Breach Resolution, and Tom Field, Vice President of Editorial for Information Security Media Group, act out a mock conversation between a data breach client and privacy attorney. Register to learn valuable lessons on how to:

See Also: How to Combat Targeted Business Email Compromise Attacks

  • Be prepared for a breach with tools such as encryption, employee training and a response plan;
  • Know your breach so you're focusing only on the pertinent facts during your response efforts;
  • Respond responsibly to help avoid reputation damage and class action litigation.

Background

Here is an opportunity to learn valuable real-life lessons from fictional scenarios.

Data breaches have become everyday occurrences, making headlines across all global regions and industrial sectors. We all have come to know too well the financial and non-financial costs of a breach.

But what have we truly learned about effective breach response?

Conversations of this nature typically happen only behind closed doors, out of the public eye, including only the parties who need to be involved.

But because such a discussion hits upon such critical topics as breach preparation and appropriate measures of response, we've created a fictional scenario to help shed light on the real-life lessons of what should/should not happen after a breach occurs.

In this session, drawing upon real-life breach experiences encountered by Michael Bruemmer of Experian Data Breach Resolution, you'll learn what happens when you don't plan ahead for a breach, and why being unprepared or negligent can be so damaging to your brand.

Among the points to be discussed:

  • Why encryption, training and a data breach response plan are all key for breach preparation;
  • How understanding the true size and scope of the breach helps mitigate risks and allow for an accelerated breach response;
  • Ways to be transparent with affected individuals and offer identity protection with credit monitoring to help restore order following the calamity.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.