Organizations need an efficient Incident Response Program if they have to respond with speed and agility to a cyber incident. While such a program should empower businesses to maintain continuous operations; it should also reduce revenue loss, fines and lawsuits, and should help the business build a sound reputation for its brand.
Some of the key components involved in planning and executing the Information Security Plan include Information Security, Governance and Risk. The organization should have a clear map of who has the key responsibility for developing an information security governance program. It should be able to review existing Information Security policies and standards to assess their suitability and adequacy in relation to industry best practices, and be able to update them as appropriate, taking into account compliance recommendations.
All these and more will be the learning a webinar from Compliance4All, a leading provider of professional training for all the areas of regulatory compliance, will be imparting. Michael Redmond, a Consultant, Speaker and Author who conducts ISO Certification Training for PECB, will be the speaker at this 60-minute webinar, which will be organized on April 15.
To gain insights into how to put a sound CSIRT program in place, please register for this webinar by visiting https://t2m.io/hd9phbb5
At this session, Michael will help participants understand how to establish Key Performance Indicators (KPI) to determine if their Information Systems Incident Response program meets business objectives and operational metrics that facilitate ongoing process improvement. She will show organizations how to develop a CSIRT Policies, Program, Plan, Playbook, Training, and Exercises.
She will show the importance of coordination in incident handling, which will halt duplication of effort. In addition, she will also show how organizations should train their employees in a way that not only focuses on the capability to react to incidents but also have the ability to utilize the resources to alert and inform their stakeholders.
Methods such as tabletop tests, tabletop exercises and full Red Team Blue team training will be explained. The idea is to help the organization preempt attacks by roleplaying an attacker, which will help it understand threats better and respond faster and more effectively.
In this session, which is aimed at the benefit of Information Security Managers, CEO, CIO, CFO, CSO, Technology Managers and Auditors; Michael will cover the following areas:
- Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
- Outlining the critical actions to take if an event affects the company or its partners
- Understanding an organizations’ susceptibility to a Cyber Attack
- Cyber Incident Response: Getting started, research, training, testing and maintaining
- Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA, AND HITRUST.
About the speaker: Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA. She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. She has been named on the list of “Women of Distinction for 2015” by Women of Distinction Magazine for her work in Cyber Security.