Turning Incidents into Insights: A Product-Led Approach to Incident Response

Logo
Presented by

Oksana Denesuik, Senior Product Manager, Solution Consultant- Billing | Kaiser Permanente, ISAA Advisory Board Member

About this talk

From data breaches to ransomware attacks, the cost of cybercrime is skyrocketing, demanding a new approach to security. Playing defense is no longer enough. Organizations need to anticipate threats and build resilience into their systems. CISOs and security leaders face immense pressure to stay ahead of the curve and build resilient organizations capable of withstanding and recovering quickly from security breaches. A product-led approach offers a proactive, data-driven solution for incident response, transforming security events into opportunities for continuous improvement. In this session, Oksana Denesiuk, product lead for billing and payments at Kaiser Permanente and ISSA Advisory Board Member, explores how cybersecurity teams can adopt a product mindset to enhance incident response, leveraging agile methodologies, iterative learning, and customer-centric thinking. Key Takeaways - Embrace a product-centric approach to incident response, treating security incidents as valuable data points for continuous improvement. - Integrate automated threat detection, secure coding practices, and incident learnings into the product roadmap. - Use post-incident analytics, telemetry, and threat intelligence to refine security controls, enhance detection capabilities, and reduce the attack surface. - Implement AI-driven detection, automated remediation workflows, and security orchestration (SOAR) to improve MTTR and MTTD.
Related topics:

More from this channel

Upcoming talks (13)
On-demand talks (653)
Subscribers (215604)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to
access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security
initiatives.