After the Boom – Recovery & Remediation

Logo
Presented by

Michael Crean, SVP of Managed Security Services, SonicWall and Cory Clark, VP of Threat Operations, SonicWall

About this talk

A cybersecurity breach doesn’t end when the attack is contained. The real challenge begins with recovery—ensuring attackers are locked out, restoring systems safely, and strengthening defenses to prevent future incidents. Join us for this crucial session on post-incident response, where we’ll break down the essential steps for effective recovery and long-term security improvement. What You’ll Learn: Post-Incident Forensics: Understanding the Damage – Obtain a Root Cause Analysis (RCA), gather forensic data, and determine how the breach occurred. Remediation & Recovery Strategies – Implement key security measures like password resets, Active Directory audits, network hardening, and patch management. Lessons Learned & Strengthening Security Post-Breach – Conduct a post-mortem review, update policies, and adopt continuous monitoring for proactive threat detection. Q&A & Key Takeaways – Gain post-breach recovery insights to ensure a structured and efficient response. This third part in our series will provide the actionable insights needed to not just recover from a breach, but to emerge stronger and more resilient. Don’t miss it!
Related topics:

More from this channel

Upcoming talks (6)
On-demand talks (113)
Subscribers (84560)
SonicWall, a partner-first business, has been an unquestioned leader in the cybersecurity for more than 30 years. SonicWall safeguards organizations
mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across endless exposure points and increasingly
remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes
the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com or follow us on Twitter, Li…