Business Continuity Management / Disaster Recovery , Cybercrime , Events

What Cybersecurity Leaders Wish They Knew Before a Breach

Chris Holden, CISO at Crum & Forster, on How Firms Can Strengthen Incident Response
Chris Holden, CISO, Crum & Forster

Crum & Forster CISO Chris Holden has helped organizations respond to many breaches over the years, and through this experience he has developed an excellent sense of who companies should call first and have on their response team if they suspect that a security incident has taken place.

See Also: OnDemand | Zero Tolerance: Controlling The Landscape Where You'll Meet Your Adversaries

In a video interview with Information Security Media Group at RSA Conference 2022, Holden discusses:

  • What CISOs wish they knew before experiencing a breach;
  • What needs to happen once an incident is suspected;
  • How to deal with cyber insurance provider requirements.

Holden is responsible for maintaining the day-to-day security of the organization's information systems and data while adhering to regulatory requirements. He started his career as a forensics analyst for Hewlett-Packard's global cybersecurity team, where he ran digital evidence collections for internal investigations related to e-discovery matters, breach incident response, HR and policy investigations. He then took on consulting roles, working on both incident response engagements and proactive services and helping build and assess security programs for globally recognized organizations.


About the Author

Michael Novinson

Michael Novinson

Managing Editor, Business, ISMG

Novinson is responsible for covering the vendor and technology landscape. Prior to joining ISMG, he spent four and a half years covering all the major cybersecurity vendors at CRN, with a focus on their programs and offerings for IT service providers. He was recognized for his breaking news coverage of the August 2019 coordinated ransomware attack against local governments in Texas as well as for his continued reporting around the SolarWinds hack in late 2020 and early 2021.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.