As IT and Security professionals, when we hear “incident response”, we largely tend to think about the technical actions that need to be taken to mitigate an attack in progress and remediate any damage done.
But so much of a response depends on your CISO and the rest of the executive team understanding the problem in order to approve the drastic steps you may want to take to fix it all. In many ways, the way you communicate the problem, the options, and the expected outcomes may more determine whether the response is successful; one miscommunicated detail and your requests like shutting down affected systems may be overridden, despite being correct technically. This only prolongs the incident… and the response.
So, how do you improve your communications during such a critical event when you need to make split-second decisions that are the difference between incident resolution and tens of thousands of dollars in remediation costs?
In this real-training-for-free session, Microsoft MVP and cybersecurity expert Nick Cavalancia takes my seat, and will first discuss:
- Why IT and the C-Suite speak different languages?
- Avoiding “Chicken Little” syndrome during an attack
- Putting incident response into business terms
Nick will be joined by Kevin Breen, Director Cyber Threat Research at Immersive Labs and Chris Pace, Technical Advocate. Chris will walk you through an interactive LockBit attack response simulation scenario where you will individually test your communication and decision-making skills live during the webcast while Kev demonstrates response activity including:
- Analyzing Cobalt Strike Beacon
- Performing a log analysis of actions taking advantage of Print Nightmare
- Identifying who is attacking the company by running LockBit in a virtual environment
- Decrypting and/or recovering from backups
This real training for free event will be jam packed with technical detail and real-world application. Register today!