Trends and Topics on Virtually Every Area of IT
Managing an Aggressive Business Disruption Cybersecurity Attack
Join us for 60 minutes
- Why a targeted cyberattack must be considered a
- How the CSIRT process can benefit from BCM best practices
- Best practices that will align BCM and CSIRT
Awareness of the rapid increase in targeted cyberattacks and the resulting breadth and depth of financial, operational and reputational impact is skyrocketing in boardrooms. Organizations must integrate computer security incident response processes with those of business continuity management to ensure effective and timely responses. In this webinar we discuss the key areas on which to focus your BCM efforts if your organization is a victim of such an event.