Navigating Cyber Disasters: Forensics and Incident Response Essentials

Logo
Presented by

Michelle Drolet, Founder & CEO, Towerwall, Ray Beken, Director, Chorus Consulting, and John-Pierre Dufour, Director of Information Technology Forensics

About this talk

In collaboration with Towerwall and Chorus Consulting, this TALK delves into the critical role of forensics in cybersecurity. As cyber threats evolve, the ability to effectively investigate and respond to incidents is paramount. This session will guide you through the intricacies of cyber forensics and incident response, ensuring you are prepared for any cyber disaster. Key Topics Covered: 1. Identifying the Root Cause of Network and Infrastructure Failures: Learn how to quickly determine the source of network disruptions and infrastructure breakdowns, ensuring a swift return to normal operations. Understand the methodologies and tools used to uncover the origins of cyber incidents. 2. Building Irrefutable Proof of Malicious Incidents: Discover how to gather and present evidence of cyber attacks, whether perpetrated by insider threats or external hackers. Learn the techniques to build a solid case that stands up to scrutiny. 3. Incident Response: Knowing Who to Call and the Benefits: Gain insights into the importance of a well-defined incident response plan. Understand the roles and responsibilities of key personnel and external experts who should be contacted immediately following an incident. 4. During an Incident: Why You Need to Call: Explore the critical reasons for immediate action during a cyber incident. Learn about the potential consequences of delays and the importance of timely intervention to mitigate damage. 5. The Proper Action During an Incident - 0-Day Action Plan: Equip yourself with a step-by-step action plan for responding to zero-day attacks. Understand the essential measures to take in the initial moments of an incident to minimize impact and preserve evidence. 6. Finding the Truth: Delve into the investigative process of cyber forensics. Learn how to meticulously analyze data, trace attack vectors, and uncover the truth behind cyber incidents. Don't miss this informative discussion!
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (36)
Subscribers (1906)
Towerwall is a woman-owned information security company offering a comprehensive suite of security services and solutions using best-of-breed tools and information security services. Our time-tested methodologies provide a consistent, repeatable, and measurable approach to information security; ranging from auditing and profiling to design and implementation. Towerwall’s 4E methodology, Evaluate Establish Educate Enforce, is time-tested, and provides a consistent, repeatable, and measurable approach to information security.