Think of your organization and how almost every aspect of it relies upon technology and computer systems. If someone hacks in, imagine the potentially devastating results. Could your business survive? Could you? Besides the obvious system downtime and theft of data, there could be data corruption, identity theft (from online personnel records), embarrassing publicity, financially devastating results or even jail time as customers and business partners learn of and react negatively to news of a compromise or security breach.
A breach can result in resources rendered unavailable and stolen or corrupted data. But one cannot overlook issues that are difficult to calculate financially, such as bad publicity, not to mention the loss of trust from your clients .
In the event that the security of a system has been compromised, an incident response is necessary. It is the responsibility of the security team to respond to the problem quickly and effectively. This lecture will demonstrate the proper initial response to computer incidents of all types (hackers, inappropriate use of network resources, other illegal activity) using Helix, e-fense, Inc.’s popular free incident response disk. A demonstration of Helix 3 Enterprise (H3E), the new network version will follow.
ARE YOU DOING ENOUGH TO DETECT, PREVENT, and RESPOND to security breaches?
Wednesday Nov 12, 2008
7:15 AM - 9:00 AM CST
Starts: 0715am
Ends: 0900am
Debby Zucker
phone:2103484848
Send Email
Printed courtesy of www.metrosa.com – Contact the Metro SA Chamber for more information.
12930 Country Parkway, San Antonio, TX 78216 – (210) 344-4848 – membership@metrosa.com