fbpx
cybersecurity
education
€ EUR
  • $ USD
  • € EUR

About webinar

Story of a Hack: Key Steps to Take When Responding to an Incident

When responding to a cybersecurity incident, it’s crucial to follow a structured approach to ensure the situation is contained, analyzed, and remediated effectively. Paula Januszkiewicz deals with incidents regularly. She supports enterprises by cooperating with teams on a daily basis, responding comprehensively while collecting evidence, and instructing local teams on how to collect IOCs and adjust actions in a timely manner according to the situation.

Join CQURE Academy Cybersecurity Expert Paula Januszkiewicz to explore the Key Steps to Take When Responding to an Incident.

Agenda

This highly practical webinar, based on case studies, will provide you with a checklist on how to respond to incidents efficiently, apply best practices, preserve evidence, and achieve comprehensive outcomes.

During the webinar, Paula Januszkiewicz will guide you through:

  1. Introduction to Incident Response:
    • Overview of incident response fundamentals.
    • The importance of having a structured approach.
    • Understanding the roles and responsibilities within the response team.
  2. Detection and Identification:
    • Techniques for identifying potential incidents.
    • Utilizing monitoring tools and SIEM systems effectively.
    • Case Study: How early detection helped mitigate a major ransomware attack.
  3. Initial Response and Containment:
    • Strategies for immediate containment to prevent the spread of the incident.
    • Best practices for short-term vs. long-term containment.
    • Case Study: A real-world example of how swift containment saved critical infrastructure.
  4. Evidence Collection and Preservation:
    • Step-by-step guide on collecting IOCs without destroying evidence.
    • Tools and techniques for forensic data preservation.
    • Legal considerations when handling evidence.
    • Case Study: Lessons from a data breach where evidence was compromised.
  5. Eradication and Recovery:
    • Methods for removing the cause and components of the incident.
    • Cleaning the infrastructure – is it even possible?
    • Discussing the risks of the “Assume the Breach” approach.
    • Case Study: Issues with central management.
  6. Post-Incident Review and Improvement:
    • Conducting a thorough post-mortem analysis.
    • Updating the incident response plan based on lessons learned.
    • Case Study: Why post-incident analysis is so important.

 

Key Takeaways:

🟢 Understand the Full Scope of Incident Response: Learn how to manage an incident from detection to recovery, ensuring each step is handled with precision.
🟢 Collecting and Preserving Evidence: Discover the best methods for collecting Indicators of Compromise (IOCs) while preserving crucial evidence for further investigation.
🟢 Real-World Case Studies: Gain insights from actual incidents handled by Paula, illustrating common pitfalls and successful strategies.
🟢 Cooperation with Local Teams: Learn how to effectively instruct and coordinate with local teams to ensure a unified and efficient response across all levels of the organization. 

 

Why Attend?

🎉 Fun Live ChallengeJoin our live challenge at the webinar for a chance to win a great prize. Learn, apply your skills, and maybe even win!

💡 Live Q&AHave questions? Get them answered on the spot by Paula!

🚀 Handy Tips and DemosWe’ve got real-world tips and live demos for you. Perfect for boosting your everyday cybersecurity skills.

Join our live webinar and upgrade your knowledge with top industry minds!

This webinar will be delivered by world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills, and no mercy for insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!

How can we help you?

Suggested searches

    Search history

      Popular searches:

      Not sure what course to look for?

      Mobile Newsletter Form