Organizations often divide Incident Response and Security Operations into two separate teams. While this allows for focused expertise, it can create a disjointed, ineffective process. Instead of pivoting to a new team and process when an incident occurs, security teams should make continuous monitoring, detection, and cleanup ongoing and cyclical. Discover a new approach to unite IR and SecOps and drive synergy across your security team.

In this web conference you will learn:

    • How to orchestrate a cohesive effort with limited budget and people
    • Training methodologies that can be implemented today
    • Resources to cover outliers
    • Framework for driving efficiencies of scale
    • Managing the legal risk that follows a breach and how your IR plan works alongside Ops
    • IR and threat hunting framework from one of the largest healthcare providers

Be sure to include your questions for the group when you register for the live or on-demand version of the broadcast. CPE credit is available.

Generously Supported By:

supported by logo
speaker photo
Katherine E. Britton, Esq.
Attorney and Counselor at Law,

Katherine Elvira Britton is an attorney with a broad range of experience in regulatory compliance, corporate training and presentation and focuses her law practice on privacy and data security law, complex civil litigation, employment and human resources counseling, and consumer protection.

Katherine advises clients and trains management and employees on compliance with federal and state privacy and data security laws, best practices, and self-regulatory programs, specifically focusing on issues involving emerging technologies. She evaluates clients’ compliance with federal, state, and self-regulatory requirements relating to the storage, transfer, sharing, and disposal of customer personal information. Katherine reviews, drafts, and negotiates vendor/supplier contracts, technology transactions, services and consulting agreements, and licensing agreements. Additionally, she drafts privacy policies, social media policies, and terms of use agreements for websites and applications tailored to clients’ business practices and implements changes to existing policies to address current and future data collection and use.

Katherine earned her J.D. in 2007 from The John Marshall Law School, where she was an editor for The John Marshall Review of Intellectual Property Law, and her B.A. in 2004 from Tulane University. Katherine is a Certified Information Privacy Professional, Certified Privacy Manager, and is admitted to the bars in Illinois, the District of Columbia, and Texas.

speaker photo
Gregg Braunton
National Director, Threat Management, Incident Response & Forensic, Catholic Health Initiatives
Gregg serves as the National Director, Threat Management, Incident Response & Forensics. In this role he manages internal/external vulnerability assessments, PENTEST activities, and web application security assessments; leads the organization’s CSIRT team, provide SCM/Cyber Hygiene governance leveraging the CIS Critical Security Controls, and supports all digital forensic and eDiscovery needs for both internal and external legal teams. Gregg has extensive civilian and military training and possesses both technical and management certifications in the Information Security discipline.
speaker photo
Keith McCammon
Chief Security Officer & Co-Founder, Red Canary

Keith leads Red Canary’s security organization and is responsible for the company’s security strategy, operations, and innovative threat detection approach. He has almost two decades of technology experience, much of it focused on identifying and solving complex problems related to information security and risk, as well as hands-on experience in offensive security operations.