NCSAM Part 1 of 4: After the Attack—Surviving and Thriving Post-Breach

Presented by

Keith Lockhart, VP Strategic Programs, AccessData, Richard Hickman, Mgr—Digital Forensics & Incident Response, Eide Bailly

About this talk

Join us as we kick off Part 1 of 4 in our Cybersecurity Awareness Month webinar series, with a replay of this informative webinar. More and more cybersecurity experts agree: it may no longer be a matter of if, but when an organization will be breached—either by accident, employee misconduct or malicious attack. What do you do when the inevitable happens? By acting responsibly and responsively, a company can save itself significant penalties and reputational damage. During this webinar, you’ll discover best practices for effectively navigating today’s alphabet soup of evolving data privacy regulations—including the GDPR, CCPA and other US and international data privacy rules—in the event of a breach: • Understand responsibilities and ramifications of ever-tightening data privacy rules • Minimize damages and mitigate risk exposure with rapid response strategies • Identify various breach threats and common network vulnerabilities • Analyze key learnings from prominent breach events • See how technology can help you investigate, automate and document key processes

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (41)
Subscribers (2851)
Whether it’s for investigation, litigation or compliance, AccessData® offers industry-leading solutions that put the power of forensics in your hands. For over 30 years, AccessData has worked with more than 130,000 clients in law enforcement, government agencies, corporations and law firms around the world to understand and focus on their unique collection-to-analysis needs. The result? Products that empower faster results, better insights, and more connectivity. For more information, visit