| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Only have the first 3hr or so.
2013 and 2014 taught us that any organization can be targeted by hackers, regardless of size or function. We all have to plan for security incidents from ransomware to defacement, hacktivism to nation state actors. You’ve set up security devices and built a monitoring program, but you still aren’t certain what to do if a crisis hits. This course will cover the basics of building incident response skills and an incident response program for organizations with 20-20,000 employees. Even if you can’t dedicate an employee to incident response, you can still prepare for a security incident. Bio: Lesley Carhart (GCFA, GREM) is the digital forensics and incident response team lead for Motorola Solutions’ managed security services organization. With 16 years of IT experience and 8 years of experience in security operations, She’s dealt with everything from aircraft avionics to conducting forensic analysis of sophisticated network intrusions. Lesley is the security blogger for Motorola Solutions Fresh Ideas in Public Safety and the author of “10 Commandments of Incident Response (for Hackers)”.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast