RSA Cybersecurity conference 2014

43 %
57 %
Information about RSA Cybersecurity conference 2014
Business & Mgmt

Published on March 6, 2014

Author: Protiviti



Surviving a Security Firestorm: tales from those who've lived through it

Surviving A Security Firestorm: Tales From Those Who've Lived Through It SESSION ID: CISO-W03 Moderator: Ronald Woerner Director, Cybersecurity Studies, Bellevue University @ronw123 Panelists: Bill Downes Kostas Georgakopoulos CISO & VP CTO Engineering The Hartford Financial Services Group US Regional Manager Security IT UBS Roland Cloutier Rocco Grillo Chief Security Officer Automatic Data Processing, Inc. Managing Director Global Leader, Incident Response and Forensics Investigations Protiviti, Inc.

Surviving A Security Firestorm – Session Overview Hearing from those who have lived through it #RSAC 2

Surviving A Security Firestorm  You think you’ve been breached.  How do you know for sure?   So you think that you’ve been hacked? Now what? What’s your process for handing a real or potential breach?  Documented or undocumented?  Formal or informal?  Reaction or response?  How Current is Your Incident Response Plan?  What's your plan ? How do you know? #RSAC 3

Surviving A Security Firestorm  To pull the plug or not pull the plug, that is the question…  Know what you don’t know before you contain  Gathering threat intelligence to understand attack vectors  Once We Find It, Now What?  When is it over? When Can We Go Back to Normal?  Lessons Learned #RSAC 4

Surviving A Security Firestorm  How do you manage the different groups involved?  External & Internal Communications  Who are the key stakeholders to involve  When to Discloses Publicly  How do you escalate?  Parallel activities  Stress One of the leading Social Media platform announced late February 2013 that it had been breached and that data for 250,000 users was vulnerable 5 #RSAC

Surviving A Security Firestorm  Who do you contact?  Internal  External  Legal,  Outside Counsel  Executive Management,   PR & Crisis Management IR Handlers &Forensics Investigators  IT,  Private investigators,  Security  Law enforcement,  End User Awareness  Vendors,  Customers #RSAC 6

Surviving A Security Firestorm  Tools & Technologies    Detection Response Logging & Auditing    Proactive – SOC monitoring Reactive Forensics #RSAC 7

Surviving A Security Firestorm  Are breaches inevitable?  Not a matter of if, but when?  If we can’t stop them, what can we do?  What advice do you have for a new CISO / Security Manager? STOP Data Breaches #RSAC 8

Surviving A Security Firestorm Session Take-Aways     “Be Prepared” Know how to fail “Who ya gonna call?” Learn from it #RSAC 9

#rsac presentations

Add a comment

Related presentations

Canvas Prints at Affordable Prices make you smile.Visit http://www.shopcanvasprint...

30 Días en Bici en Gijón organiza un recorrido por los comercios históricos de la ...

Con el fin de conocer mejor el rol que juega internet en el proceso de compra en E...

With three established projects across the country and seven more in the pipeline,...

Retailing is not a rocket science, neither it's walk-in-the-park. In this presenta...

What is research??

What is research??

April 2, 2014

Explanatory definitions of research in depth...

Related pages

Where The World Talks Security | RSA Conference

RSA Conference conducts information security events around the globe that connect you to industry leaders and highly relevant information. We also deliver ...
Read more

USA 2014 | RSA Conference

RSA Conference 2014 ... Join us for RSA Conference 2015 April ... RSA and their respective logos are registered trademarks or ...
Read more

RSA Conference 2014 - TeleTrusT – Bundesverband IT ...

TeleTrusT-Programm auf der RSA 2014 (gemeinsam organisiert mit den TeleTrusT-Mitgliedern GABA, Symantec, Bundesdruckerei):
Read more

State of Cybersecurity: Implications for 2015

205 ll t 3 State of Cybersecurity: Implications for 2015 The survey was sent to selected ISACA certification holders and RSA Conference constituents.
Read more

Art Coviello's Keynote Speech RSA Conference 2014

Art Coviello's Keynote Speech RSA Conference 2014; Data & Spec Sheet February 25, 2015 ... RSA Cybersecurity Poverty Index. videos. SAIC on RSA Security ...
Read more

RSA® Conference 2014 Gathered Top Information Security ...

RSA® Conference 2014 Gathered Top Information Security Experts to Address Critical Cybersecurity Issues Through Debate and Shared Learning.
Read more

RSA Conference 2014: Lively discussions at the Microsoft ...

Today at the RSA Conference, we heard from people at the Microsoft booth, including several company representatives and some of the customers ...
Read more

Insights | RSA

View past RSA conference keynotes and Congressional speeches on cybersecurity to experience why RSA is a leader in cybersecruity technology.
Read more

RSA Conference 2014: Microsoft’s commitment to ...

The annual RSA Conference USA in San Francisco brings together many of the brightest minds in IT security and features a wide range of important ...
Read more

RSA Names -Cybersecurity Ventures

RSA Names. Exhibitor and Speaker Contacts from the Leading Cybersecurity Conference. RSA Names is a special research project and compilation that profiles ...
Read more