“We’ve Been Hit, Now What?” – Responding to a Cyber Attack

Delivery:75 Minutes
Time can be reduced or lengthened, depending on your needs
Format:Interactive with audience, Q&A, along with use of other visuals as needed.

SUMMARY

Statistically speaking, a cyber attack will almost surely happen to every business at some point. It’s simply impossible to have a completely full-proof security program that’s in place and functioning as required 24/7. If you’ve been hit with a cyber-attack, do you know what steps to take – and immediately? How do you quarantine systems? What notification procedures are in place? Do all employees have specific roles and responsibilities if such an attack unfolds? Charles’ keynote, “We’ve Been Hit, Now What” – Responding to a Cyber Attack will get your organization ready and prepared for putting into action all the necessary steps for successfully responding to a cyber-attack.

Download The Media Kit

Get Access

Topic covered in Charles’ keynote include the following

  • Alarming statistics on breaches and the slow responses, and the consequences
  • Essential training measures for getting your organization prepared
  • The importance of a well-written Incident Response Plan
  • Responding and mobilizing 101 best practices
  • Securing and quarantining systems
  • Investigating incidents and lessons learned
  • Public Relations essential for managing incidents
  • Assessing legal and regulatory compliance issues

Learn how to Gain A Competitive Advantage through Cybersecurity

Media Kit Download
Obtaining a Competitive Advantage with Cybersecurity
Get my Media Kit
Current Releases
Best Selling Author
By Charles Denyer
Laser focused
One on One
Smash Through Your Barriers
Keynotes for businesses
ENGAGE > EDUCATE > EMPOWER
With Charles Denyer
Slider

Additional Keynote Topics

A Security First Marketing Approach

Changing Organizational Culture when it comes to Cybersecurity

The A to Z on Cybersecurity

Cyberterrorism & America’s Critical Infrastructure

Responding to a Cyber Attack

Understanding Today’s Growing Data Privacy & Regulatory Compliance Landscape

Can’t Have One Without the Other

Why InfoSec & Cybersecurity and Regulatory Compliance are Forever Hitched with One Another

2019 M​​​​EDIA KIT DOWNLOAD​ 
Proven results that give you a competitive advantage