Security breach response time: Get it right, and save money

The longer it takes to respond to a security breach, the more it will cost your organization.  According to the 2013 Ponemon Cost of Cyber Crime Report , it takes an average of 32 days to resolve a cyberattack at a cost of $1,035,769, which equates to $32,469 per day.  Imagine if you had the tools to identify a cyberattack sooner and resolve it faster.  The savings are tangible...and huge!


On November 21, 2013, HP is joining forces with Co3 Systems to present a webinar on incident response.  Join us to dig deeper into how security monitoring can be integrated with incident response programs to reduce the overall cost of an attack.


According to Gartner, "75% of CISOs who experience publicly disclosed security breaches and lack documented, tested response plans will be fired." According to Forrester, "You can’t afford ineffective incident response.” Despite these stakes, the incident response capability at most organizations is immature.

Based on an anonymized breach scenario, this webinar will define a framework for the broader incident response (IR) process. By highlighting IR components that were handled well, and a few that weren't, attendees will gain practical experience to help them better prepare for the inevitable.

 

co3.png

The featured speakers for this timely webinar will be:

 

- Jim Goddard, Managing Principal, Security Intelligence and Operations Consulting, HP Enterprise Security

 

- Ted Julian, Chief Marketing Officer, Co3 Systems, serial security and compliance entrepreneur

 

Title: Incident Response: Don't Mess It Up, Here's How To Get It Right
Date: Thursday, November 21, 2013
Time: 1:00 PM - 2:00 PM EST

 

Space is limited, so reserve your webinar seat now:
https://www4.gotomeeting.com/register/343160383

Comments
Kerry_Matre | ‎11-25-2013 08:26 AM
Kerry_Matre | ‎12-02-2013 12:50 PM
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation