Podcast: Lessons from Fortune 100 Incident Response
Tim Bandos and Paul Roberts discuss the current state of incident response at organizations along with tips for more effective IR learned from Tim’s tenure at a Fortune 100 manufacturer.
Tim Bandos and Paul Roberts discuss the current state of incident response at organizations along with tips for more effective IR learned from Tim’s tenure at a Fortune 100 manufacturer.
Tim Bandos and Paul Roberts discuss the current state of incident response at organizations along with tips for more effective IR learned from Tim’s tenure at a Fortune 100 manufacturer.
Reasonable people can, and often do, disagree about what constitutes a proper public response to a data breach. Some people want immediate and full disclosure of all of the details of the event, while others tend to favor a more measured approach, releasing some information at the beginning and more data as things shake out.
Time is of the essence when responding to a security incident – Part 2 of our Field Guide to Incident Response series offers five don’ts and four do’s for effective incident response. The video clip below explains the do's and don'ts of incident response and is taken from our webinar, Incident Responder's Field Guide - Lessons from a Fortune 100 Incident Responder. You can watch the full webinar here.
Learn more about cloud security monitoring solutions in Data Protection 101, our series on the fundamentals of data security.
Should businesses be liable for the pain and suffering experienced by customers as the result of a data breach? Lawmakers in Australia say “yes.”
Should businesses be liable for the pain and suffering experienced by customers as the result of a data breach? Lawmakers in Australia say “yes.”
Most people don’t pay a lot of attention to government technical guidance and regulations, which is completely understandable. They’re government regulations, after all. But sometimes, buried deep inside these dense bureaucratic reports, there is some guidance of actual value, and the new authentication guidelines from NIST is one of those rare documents.
Most people don’t pay a lot of attention to government technical guidance and regulations, which is completely understandable. They’re government regulations, after all. But sometimes, buried deep inside these dense bureaucratic reports, there is some guidance of actual value, and the new authentication guidelines from NIST is one of those rare documents.
Our Definitive Guide to DLP series concludes with two frameworks for meeting your long-term DLP goals.