With worldwide cyber events like WannaCry (and other forms of ransomware), DDoS attacks, phishing attacks, and a plethora of other threats, it is critical to have an incident response plan in place. As an industry, is there a definition for what constitutes an incident versus a breach? At what point do you need to alert the authorities or publicly disclose that you’ve been hit? These are legitimate questions that IT and InfoSec professionals must address.

Every second counts after a cyber attack, therefore it is imperative to have a solid plan in place for actions required in the moments immediately following an incident. Do you have a plan in place? Maybe you do but aren’t sure about how effective it will be. Join our experts as we discuss these questions and provide some insight into what your response plan should include and how best to implement and test it.

Be sure to include your questions during registration so our presenters  can address your concerns during the webcast. CPE credit is available.

Generously Supported By:

supported by logo
speaker photo
Amy Mushahwar
Counsel & CISO, ZwillGen
Amy Mushahwar is a data privacy, security, and management attorney with over 15 years of experience in the technology industry in legal and engineering capacities. Amy defends companies in privacy-related matters as well as assists clients in the development of integrated digital platforms, such as cloud computing and database APIs.
speaker photo
Kim Jackson
Director, Business Resiliency, ADP
Kim Jackson is a certified business resiliency professional with over 20 years of experience in incident management, disaster recovery, and business continuity, with a specialization in program development. Kim has successfully created programs for several major banking entity's, as well as large insurance and financial firms to ensure the viability of the organization during an event. Kim currently is the Director of Business Resiliency with ADP, where she continues to drive overall resiliency and incident management for the organization. Kim holds a Bachelor of Arts, and MBA in Economics, and is an avid runner.
speaker photo
Israel Barak
CISO, Cybereason

Israel Barak is a cyber defense and warfare expert, with his extensive background established at the Israeli Defense Forces and the Government of Israel. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats. Mr. Barak founded and headed the Israeli Defense Forces red team unit, as well as established and operated various cyber warfare teams. As part of his various roles, Mr. Barak developed cyber warfare infrastructure and proprietary technologies, including leading development of proprietary cryptographic solutions, research and analysis of security vulnerabilities, information security products and technologies, and managed enterprise-wide large scale development and implementation projects of cyber technologies. Israel Barak spent years training, guiding and professionally mentoring new personnel, providing in-depth cyber expertise as it relates to cyber warfare, cyber security, and threat actor’s tactics and procedures.

speaker photo
Dr. Robert McKosky
Asst. Professor, Drexel University
Dr. Robert McKosky (Mac) was the Chief Security Architect at Ellucian (SunGard Higher Education). Mac was responsible for defining and evolving the architectures, technologies, standards, and development practices employed in the areas of security and privacy.