What Do You Need to Consider for Your Cyber Incident Response Framework?

Logo
Presented by

Steve Yates FBCI, CBCP, FICPEM, MEPS, Director | Acertia Limited

About this talk

With the CrowdStrike incident impacting so many organizations, it is imperative to understand your organizations’ cyber incident response framework especially when you screen goes “blue”! According to a snap poll conducted by Aon, 83% of risk professionals said their organisation had an incident response plan in place. But when CrowdStrike occurred, 24% said these plans underperformed. The entire poll of 500 risk professionals from across the UK and Europe revealed that 62% were directly or indirectly impacted by the global outage. This presentation will focus on the 2025 to 2030 threatscape and considerations for an “joined-up” incident response framework that your organization should consider if it hasn’t already. Tune into this session presented by business continuity, disaster recovery, cyber resilience and major incident expert Steve Yates, as he shares tips to prepare for the 2025 threatscape. Yates will explore current operational cyber incident response areas, identified from more recent events such as dependency mapping, scenario planning and testing, and the core structure that your organization should have in place. By the end of the session, you will be able to: - Know the importance of dependency mapping, specifically for the “before”, and the challenges that will happen if not established for the “after.” - Form an understanding of how scenario planning and testing can be become critical in the preparation for significant cyber disruptions and provide the need for resources and capacity capabilities. - Understand the core organizational components needed for a cyber incident response framework.
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (617)
Subscribers (204655)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.