cyber incident response plan

What’s Your Cyber Incident Response Plan? Delta Risk VP Discusses Effective Methods to Handle an Attack

In Data Security by Devesh Panchwagh

Delta Risk VP of Solutions Chris Evans will lead a discussion at the (ISC)²® Alamo Chapter meeting on how organizations can leverage cyber exercises to handle cyber incidents as they unfold. Evans will guide meeting participants through the different stages of cyber exercises and the 10 most common pain points that are associated with incident response.

It’s not a matter of if a cyber incident is going to take place – it’s a matter of when. Organizations need a proactive strategy to prevent the spread of an attack and mitigate the impact across critical infrastructure and information assets. Having a reliable plan of action is also a must to ensure that leadership and response teams are on the same page. According to a 2015 Ponemon Institute study, only 25 percent of security professionals surveyed believe their organization could withstand an attack, and only one in three believe they can properly recover from a cyberattack.

How can your organization get up to speed and stay prepared when the next incident takes place? Practice makes perfect. Cyber exercises enable your organization – regardless of industry or size – to take part in simulated attacks to test out workforce responsiveness and ascertain the most common pain points in these high-pressure situations.

The (ISC)²® Alamo Chapter meeting is set to take place on July 14, from 12:00 pm to 1:30 pm CDT. For additional event details, visit the (ISC)²® Alamo Chapter website.

About the (ISC)²® Alamo Chapter

Throughout the year, the (ISC)² Alamo Chapter in San Antonio, TX hosts regular business meetings, professional events, and social activities. General Membership Meetings are held every second Thursday of the month.

The (ISC)² Alamo Chapter provides members a forum to facilitate the exchange of knowledge and ideas, development of leadership and professional skills, and advancement of information systems security. We also provide our members with access to a variety of industry resource and educational programs to keep our members informed of the latest advances in technology and techniques.

Share this Post