fbpx
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

cybersecurity
education
€ EUR
  • $ USD
  • € EUR

About webinar

Story of a Hack: Key Steps to Take When Responding to an Incident

When responding to a cybersecurity incident, it’s crucial to follow a structured approach to ensure the situation is contained, analyzed, and remediated effectively. Paula Januszkiewicz deals with incidents regularly. She supports enterprises by cooperating with teams on a daily basis, responding comprehensively while collecting evidence, and instructing local teams on how to collect IOCs and adjust actions in a timely manner according to the situation.

Join CQURE Academy Cybersecurity Expert Paula Januszkiewicz to explore the Key Steps to Take When Responding to an Incident.

Agenda

This highly practical webinar, based on case studies, will provide you with a checklist on how to respond to incidents efficiently, apply best practices, preserve evidence, and achieve comprehensive outcomes.

During the webinar, Paula Januszkiewicz will guide you through:

  1. Introduction to Incident Response:
    • Overview of incident response fundamentals.
    • The importance of having a structured approach.
    • Understanding the roles and responsibilities within the response team.
  2. Detection and Identification:
    • Techniques for identifying potential incidents.
    • Utilizing monitoring tools and SIEM systems effectively.
    • Case Study: How early detection helped mitigate a major ransomware attack.
  3. Initial Response and Containment:
    • Strategies for immediate containment to prevent the spread of the incident.
    • Best practices for short-term vs. long-term containment.
    • Case Study: A real-world example of how swift containment saved critical infrastructure.
  4. Evidence Collection and Preservation:
    • Step-by-step guide on collecting IOCs without destroying evidence.
    • Tools and techniques for forensic data preservation.
    • Legal considerations when handling evidence.
    • Case Study: Lessons from a data breach where evidence was compromised.
  5. Eradication and Recovery:
    • Methods for removing the cause and components of the incident.
    • Cleaning the infrastructure – is it even possible?
    • Discussing the risks of the “Assume the Breach” approach.
    • Case Study: Issues with central management.
  6. Post-Incident Review and Improvement:
    • Conducting a thorough post-mortem analysis.
    • Updating the incident response plan based on lessons learned.
    • Case Study: Why post-incident analysis is so important.

 

Key Takeaways:

🟢 Understand the Full Scope of Incident Response: Learn how to manage an incident from detection to recovery, ensuring each step is handled with precision.
🟢 Collecting and Preserving Evidence: Discover the best methods for collecting Indicators of Compromise (IOCs) while preserving crucial evidence for further investigation.
🟢 Real-World Case Studies: Gain insights from actual incidents handled by Paula, illustrating common pitfalls and successful strategies.
🟢 Cooperation with Local Teams: Learn how to effectively instruct and coordinate with local teams to ensure a unified and efficient response across all levels of the organization. 

 

Why Attend?

🎉 Fun Live ChallengeJoin our live challenge at the webinar for a chance to win a great prize. Learn, apply your skills, and maybe even win!

💡 Live Q&AHave questions? Get them answered on the spot by Paula!

🚀 Handy Tips and DemosWe’ve got real-world tips and live demos for you. Perfect for boosting your everyday cybersecurity skills.

Join our live webinar and upgrade your knowledge with top industry minds!

This webinar will be delivered by world-renowned Cybersecurity Experts with practical knowledge from tons of successful projects, many years of real-world experience, great teaching skills, and no mercy for insecure solutions.

Paula

Januszkiewicz

Founder & CEO, Microsoft Regional Director, MVP, MCT

Paula is a world-class Cybersecurity Expert with over 19 years of experience in the field. She is often a top-rated speaker at the world biggest conferences as her unique stage presence is always well-received among diverse audiences. To top it all, she has the access to the source code of Windows!