- This event has passed so registration is closed.
It’s clear that cybercrime and cybercriminals are not abating during the global upheaval caused by COVID-19 and the Russian invasion of Ukraine. Organizations of all sizes are targets for potential cyberattacks, but most don’t have a plan or the expertise to quickly respond in case of a breach. It’s important for IT teams to have a solid foundation to build their incident response plans on and act quickly to secure their environments.
Join this webinar to learn:
- Key steps needed in an incident response plan
- The speed adversaries move through the network and the time needed to respond before a breach
- Methods used to effectively disrupt and ultimately remove bad actors from the network
- Real world examples of cyberattacks and the steps taken to detect, respond and recover from the incident successfully
Alex Grohmann – Founder, Sicher Consulting
Mr. Grohmann (CISSP, CISA, CISM and CIPT) is founder of Sicher Consulting and a member of the ISSA international board of directors. He is a long time member of ISSA including being president of the Northern Virginia chapter for three years. He is also a member of the ISSA Honor Roll.
Yinan Yang – Director, Professional Services, CrowdStrike
Yinan Yang is a Director with CrowdStrike’s Incident Response practice where he currently leads teams responsible for the delivery of incident response and breach investigation services across North America. Together, they have investigated hundreds of cases that ranged from Nation State intrusions to e-Crime and ransomware attacks. He has over a decade of cybersecurity experience across all major commercial verticals and Department of Defense (DoD) specializing in areas of digital forensics and incident response, threat hunting, security operations and cyber threat intelligence integration. In addition to his operational and supervisory duties, Yinan also leads methodology development and executive engagement efforts for the practice.
ISSA Webinars and Conference series cover all the continuing education credits to maintain your cyber security certifications. (CPEs, CEUs, ECE, etc). Each hour is equal to one continuing education credit. Certificates of completion are available upon request after completion. For instructions, click here.