Date: April 18, 2024
Time: 10:00 AM EDT | 9:00 AM CDT | 7:30 PM IST
Topic: A Guide to Incident Response Framework: IR Planning and Testing Essentials
Watch Now
Abstract: In the incident response (IR) lifecycle that involves phases of preparation, identification, containment, mitigation, and recovery, planning a threat response protocol holds significant importance. Incident response planning involves preparing comprehensive strategies to swiftly and effectively address cybersecurity breaches or data security emergencies. It involves identifying threats, establishing response protocols, training personnel, and regularly testing and updating procedures to mitigate risks and minimize the impact of incidents on an organization’s operations and reputation. This webinar, from the “A Guide to Incident Response Framework” series, will detail the process of developing and implementing an incident response plan framework. It further addresses testing considerations across a wide range of industries to identify where organizations go wrong when it comes to testing and allocating resources for testing.
Key Takeaways:
- Composition of an IR Plan
- Key Considerations
- IR Testing
- Pen Testing
- Vulnerability Assessment
- Testing Selection
Speaker:
Eder Ribeiro, Senior Cybersecurity Program Manager
Bio: Eder graduated from Roger Williams University School of Law, earning his Juris Doctor. He has also earned a Master of Science in Cyber Security. He has led TransUnion’s Incident Response Forensics (IRF) team over the last six years. In his “leading from the front” style, Eder has led the IRF team through thousands of cases ranging from unauthorized cryptocurrency mining, ransomware, business e-mail compromises, and much more.
Eder also has 16 years of experience in the United States Rhode Island Army National Guard, where he led troops as a team leader on a combat deployment in the Kandahar Province in support of Operation Enduring Freedom. Eder is a certified mediator and performs duties at the state headquarters level. Eder’s expertise includes solution/product creation, program development and expansion, threat assessment, risk mitigation, security process improvement, privacy compliance, and contract drafting. He has worked with over 1,000 organizations in his current capacity, helping them determine and react to the nature of their security incident breaches and determining the best course of action to recover to safe operations and meet compliance obligations.
*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)