Guidelines For Handling a Cyber Security Breach
Free to ACEC Members and Non-Members
Credit
PDH Credits:1.0
Description
As the client demand for cybersecurity increases, it's more crucial than ever to not only have security measures but also, a response plan in place.
Join Jim Jacobi and Mason Pokladnik as they outline recommended practices for responding to a cybersecurity breach. Using a virtual case study, they'll also demonstrate the response process and discuss critical components of cybersecurity plans.
TAKEAWAYS:
- Understand current cybersecurity risks and the threat environment, what has changed with the pandemic
- Guidelines for developing an Incident Response Plan and a step-by-step response to a security breach
- Strengthen security controls in their organization for a Defense-In-Depth Program