Almost like being there, our Recorded Online Training sessions are available for sale in recorded format.
Link(s) and password to recorded WebExTMsession(s) accessible from your Account page after purchase.
Why do some organizations emerge from a data breach unscathed, while others are badly damaged, or even collapse? How can you make smart choices to protect your organization before and after a data breach? This book exposes the high-octane world of data breach disclosure and response, where IT help desk staff have the power to save or destroy a company, and cutting-edge attorneys must often parachute in to save the day. You’ll watch as one of the world’s most experienced cybersecurity professionals dissects high-profile data breaches, reveals what happened, and reveals exactly what you can do to navigate a massive data breach -- quickly mitigating damage to your digital assets, finances, and organizational reputation.
Sherri Davidoff teaches through storytelling, making this book powerfully accessible and practically useful to everyone from the boardroom to the server closet. Along the way, she reveals what the press didn’t cover about attacks on ChoicePoint, TJ Maxx, Heartland, Target, Anthem, and many other leading organizations -- and presenting specific lessons you can start applying right now, regardless of your technical or business infrastructure.
Drawing on her immense personal experience with digital forensics, incident response, security awareness training, penetration testing, and web security assessment -- and her work teaching in venues from Black Hat to the Department of Defense -- Davidoff introduces today’s most comprehensive and practical framework for data breach response. You’ll discover:
1. Dark Matters
2. We’re All Targets
3. The Original Poster Child: ChoicePoint
4. Buddha Says: Your Credit Card Number is Already Stolen
6. Poor Banks
7. Passwords are Passé
8. Buddha Says: Your Social Security Number Is Already Stolen, Too
9. Blame China (or Russia... or North Korea)
10. Extremely Sophisticated Cyberattacks
11. Sharing is Caring
12. Don’t Stick Your Penis in a Hornet’s Nest
13. Commercial Off-The-Shelf Breach Response
14. C NEst Pas Un Data Breach
15. Have a Cookie. Here, Have Two Cookies.
16. Beyond PII
17. How to End Up Better Off