Webinars are purely educational. Instructors are not permitted to sell any
products or services during the presentation.
is our primary focus in protecting our institutions, but how would we know
if we failed to prevent an attack? Knowing what threats are realistic for
your institution and how to detect them is a challenging task. Some
statistics suggest it would take us more than 180 days to detect a breach.
This would suggest we don’t know what realistic threats are to us and how
to see them within our institutions.
identify a threat, we need clear steps to contain, eradicate, and recover.
In this session we will explore possible threats that we should be prepared
for and how to build a program to protect against them. This program needs
to include a forensics component that can collect, examine, and analyze
evidence that will be necessary for data breach notification and legal
matters that incidents create.
You Will Learn:
- Common threats
- Detection methods
- Incident response procedures
- Incident response testing methods
- Digital Forensics
Security Officer, Incident Response Team Members, IT Manager, Risk Officer,
Internal Auditor, and other employees responsible for incident response and
information security program development. Please forward email to appropriate person(s).
is a Senior Information Security Consultant at SBS CyberSecurity in
Madison, South Dakota. SBS is a premier cybersecurity consulting and audit
firm dedicated to making a positive impact on the banking and financial
services industry. Buzz was trained in Information Security at the SANS
Institute – an internationally recognized best source for cybersecurity
education. Buzz has been involved with Information Security practice in
Healthcare, Banking, Government, and many other industry verticals since
2004 and has helped over 200 organizations improve their information
security processes and programs. Buzz additionally has numerous security
publications in magazines such as 45 Magazine and MED Midwest Medical
Edition, and speaks nationally on various cybersecurity topics.
Is A Webinar?:
webinar combines the clarity of an audio teleconference with the
interactivity and visual presentation of the internet. All you need to
participate is a telephone and an internet connection. Even if you don't
have an internet connection, you can still participate in the audio
session. Listening to the program over the telephone and following the
written materials is an effective alternative!
problem. You can purchase a recording of the webinar for future use. You
can choose from either an On-Demand Web Link (Good for 6 months from the
webinar date, unlimited use) or a CD-ROM (includes a paper copy of the
Options (all options include applicable handouts):
options include applicable handouts. You can choose to pay by credit card
or be billed. Additional Live Webinar connections are $75 each.
Option 1: Live
Webinar and 7 Days OnDemand Video Playback - $265
OnDemand Video (six months access) - $295
Option 3: Live
and 6 Months of OnDemand Video - $365
Option 4: CD-ROM
Video (Includes OnDemand Video) - $345
Option 5: Entire
Package (all of the above) - $395
Powered by Total Training Solutions!