You will be attacked, you will be breached, now what do you do? Organizations focus on securing the cyber infrastructure, monitoring the networks, and hunting for threats. At the moment of the breach how do you respond? Organizations must develop the response and recovery plans that include operational decision impacts at the business process level, continuity of business responses, public relations, as well as technology driven decisions. The leadership of the organization must practice when to escalate and ask for help from outsider providers, informing law enforcement, and engaging with critical business partners. We will discuss how the elements of the response framework and how to practice and improve your plan.
Minimum Requirements – Windows 7, Mac OS X 10.7, Internet Explorer 9, Chrome 44, Firefox 45, Safari 6, Opera 12
Please keep in mind that these are minimum requirements and other environmental factors may impact your course delivery performance. Contact us if you have any questions about your specific environment or if you are experiencing any technical issues. Be sure to close all other tabs, browsers, and programs while streaming your content. It may also help to hard wire your internet connection instead of using a wireless connection. While Federal Publications Seminars may run without issue in older operating systems and browser versions, these are not actively tested and we may not address issues that appear when operating within these older environments.