Skip Main Navigation
Page Content

Save This Event

Event Saved

Incident Responders 3-Day Workshop - A Practical Response to Cyber Incidents

DigitalDefence

Wednesday, 25 April 2018 at 9:00 AM - Friday, 27 April 2018 at 5:00 PM (EDT)

Incident Responders 3-Day Workshop - A Practical...

Ticket Information

Ticket Type Sales End Price Fee Quantity
General Admission 26 Mar 2018 $1,800.00 $70.57

Share Incident Responders 3-Day Workshop - A Practical Response to Cyber Incidents

Event Details

DigitalDefence’s 3-day workshop for First Responders is a hands-on look at how data security incidents are caused, how to recognize them, and how to resolve them with minimal financial loss and reputational damage.

The First Responder in a data security incident plays a pivotal role – they will be the one who first recognizes that an attack is taking place, and will put into place the steps that will stop the attack, minimizing your financial loss and damage to your data.

DigitalDefence’s workshop for 1st Responders is a practical look at how incidents are caused, how to recognize them, and how to resolve them. A core component of the program is unique scenario-based training based on real Canadian security incidents.

What You Will Learn

• How to create an enterprise incident response strategy and plan in advance for a security incident, ensuring organizational readiness

• How to effectively respond to an incident, and avoid common –and costly— mistakes

• Leveraging the most up-to-date investigative techniques and tools (commercial and open source / freeware)

• How to gather the information needed for root–cause analysis and support legal action

• How to manage the response process

• How to satisfy regulatory requirements under HIPAA / HITECHISO 27001, PCI DSS,  Sarbanes-Oxley, and other frameworks

• Become a DigitalDefence Certified Incident Responder, and will have access to pre-and post-course material, and the tools to stay current in this fast evolving field 

Course Overview

• The threat and attack methodologies—attackers, methodologies, tools, and types of incidents • Legal and regulatory requirements— criminal and civil law, regulations, privacy law, mandatory

breach reporting, cross-border security and privacy issues

• Agile Incident Management TM - the failure of “classical” incident response methodologies, Agile Incident Management, preparing for an incident, strategic and tactical approaches to incident response

• Documenting strategy to tactics—creating an enterprise incident response policy; creating and documenting standard operating procedures to guide a response; dealing with third parties (legal, law enforcement, cyberinsurance)

• Identifying a cyber incident—what to look for at the scene of the cybercrime, network and host attacks, conducting a rapid triage to determine attack activities and impact, rapid analysis of event logs, identifying Indicators of Attack

• Intelligence and threat handling—proactive versus reactive threat management, commercial and open source threat intelligence, risk assessments and threat modeling, identifying and hunting for Indicators of Compromise

• Recognizing and responding to physical and social engineering attacks—psychology of social engineering attacks, attack methodologies, remote and on-site attacks, effective response, addressing social engineering in policy and security awareness training

• Network and host based attacks—recognizing attacks, effective responses to the most common attack types

• Insider threat—profiles of the insider threat, attack types, responding to the insider, developing an insider threat response strategy

• Rapid malware analysis—types of malware, methodology, creating a safe analysis environ- ment, online analysis tools, static and dynamic analysis, analysis of malicious files (MS Office, PDF), analyzing system memory for malware and attack artifacts

• Acquisition and management of electronic evidence—legal considerations, gathering evidence from live and static systems, documentation for court

• Static data forensics—the forensic process, indexing, file carving, registry analysis, operating system and event logs, email and browser forensics (Windows and Unix-based systems)

• Live system and volatile data analysis—live system triage, RAM acquisition and analysis, ex- traction and analysis of the registry, key file extraction and analysis (Windows and Unix-based systems)

• Making a jump bag for incident response—Selecting, testing, and validating tools, scripting the incident response 

 

FAQs

All Sales Tax has been included in the $1,800

Will meals be provided

Snacks and Lunch will be provided all three days 

Are there ID or minimum age requirements to enter the event?

No

What are my transportation/parking options for getting to and from the event?

Free parking is provided onsite

How can I contact the organizer with any questions?

Please contact shawn.brown@digitaldefence.ca with any further questions.

What's the refund policy?

Full refunds will be given up to 7 days before the event.

Do I have to bring my printed ticket to the event?

No

Can I update my registration information?

Yes, by contacting DigitalDefence by phone or email.

Is my registration fee or ticket transferrable?

Yes

Is it ok if the name on my ticket or registration doesn't match the person who attends?

Yes

Have questions about Incident Responders 3-Day Workshop - A Practical Response to Cyber Incidents? Contact DigitalDefence

Save This Event

Event Saved

When & Where


Muller Systems Corporation
926 Juliana Drive
Woodstock, ON N4V 1B9
Canada

Wednesday, 25 April 2018 at 9:00 AM - Friday, 27 April 2018 at 5:00 PM (EDT)


  Add to my calendar

Organizer

DigitalDefence

About Us

We stop breaches.

We all understand the devastating impact that a security breach has on a company – financial loss, regulatory fees and penalties, and a loss of customer confidence are typical responses.

At DigitalDefence, we enable our customers to secure the critical data that supports their business by protecting them against security breaches. Our strategic advisory services, protective services, and incident response services allow our customers to focus on their business while we focus on managing their security and privacy risks.

Since 2003, we have provided unparalleled security services Canada-wide and abroad, supporting organizations of all sizes and market verticals.  Our success can be attributed to our consultants, and to their methodological approach to service delivery.

Our consultants are hand-selected professionals from a range of business and IT security backgrounds.  Their diverse business and technical skills drive an internal culture of learning, challenging us to constantly improve to overcome evolving cyber threats.  DigitalDefence’s consultants actively work to build rapport with our customers, becoming trusted advisors by offering impartial advice to support security within the business.

To deliver appropriate, actionable, and complete solutions that meet customers’ security needs, our consultants work within the Information Security Management Model (ISMM) – a comprehensive methodology we use to identify, prioritize and deliver risk and security management to ensure consistent solution delivery.

A significant portion of our ISMM model is dedicated to information leadership.  We share our knowledge and technical skills with our customers during the engagement process, through formal training courses, and by our participation in industry leading forums, such as the Toronto Area Security Klatch and the SecTor security conference.

At DigitalDefence, we pride ourselves on being the best in the business.

  Contact the Organizer
Incident Responders 3-Day Workshop - A Practical Response to Cyber Incidents
Things to do in Woodstock Class Other

Please log in or sign up

In order to purchase these tickets in installments, you'll need an Eventbrite account. Log in or sign up for a free account to continue.