Video: Breaking Down Incident Response
In this 45 minute session called “Breaking Down Incident Response”, InfoTrust security consultants covered;
- How ready your organisation needs to be to respond to an incident
- The difference between an event and an incident, and when you should take action
- How organisations currently triage incidents and where improvements can be made
- Advice on communicating incidents
- When you need to notify the OAIC of a data breach
To access the recording today fill out the form below.
You may also be interested in our white paper – Protecting Against Different Types of Cyber Incidents and Responding to Cyber Attacks.
InfoTrust offers a complimentary security assessment to all businesses, if you’d like to find out more contact us today.
see our
Related resources
In this 45 minute session, InfoTrust and Mimecast email security experts broke down the different types of prevalent email attacks by their tactics and how these can be mitigated.
We looked at the attack chain for;
- Phishing attacks
- Business Email Compromise and Spear Phishing
- Account Takeover Attacks
- Ransomware Attacks
Giving examples of how each tactic evades your traditional security controls, and why next-generation solutions – specifically Secure Email Gateways, are a necessity for businesses.
In December 2019, InfoTrust’s Cyber Defence Team presented with Okta specialists on Zero Trust and how organisations can incorporate it into their security strategy. Our cloud security experts covered;
- What is Zero Trust and where did it come from? More than just a buzzword, a practical security strategy for businesses
- Why is Zero Trust needed as part of a holistic security strategy?
- The Zero Trust maturity curve and how your business can progress through it
- Frequently asked questions by organisations when on the Zero Trust journey
To watch the webinar recording fill out the form below.
In August 2019, InfoTrust’s Cyber Defence Team presented on the advanced threats that we are seeing in the market, and common email security challenges we help our customers solve in their ecosystem.
Richard, John, and Caitlin covered how your organisation can mitigate the risk of;
We're Here To Help