Back to Basics: Planning for a Breach Edition

Logo
Presented by

John Robison, Chief Security Officer at ProMiles, INC.

About this talk

This presentation presents breach management having two requirements, controlled and uncontrolled. Today, the CSIRP is a mythological beast. Theses two requirements of breach management are the reasons for the myth. The missing first step was found as evidenced by participating in audits and jobs. Why planning for the breach is necessary. Key people, identified by name in contract or law, are to be the principle agents of notification. Identifying responsible parties for both of the two requirements is one problem. Find out the other problems.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198859)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.