A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


 Building an Incident Response Program - Lesley Carhart (Circle City Con 2015 Videose 2015) (Hacking Illustrated Series InfoSec Tutorial Videos)

Building an Incident Response Program
Lesley Carhart

Circle City Con 2015

Only have the first 3hr or so.

2013 and 2014 taught us that any organization can be targeted by hackers, regardless of size or function. We all have to plan for security incidents from ransomware to defacement, hacktivism to nation state actors. You’ve set up security devices and built a monitoring program, but you still aren’t certain what to do if a crisis hits. This course will cover the basics of building incident response skills and an incident response program for organizations with 20-20,000 employees. Even if you can’t dedicate an employee to incident response, you can still prepare for a security incident.

Bio: Lesley Carhart (GCFA, GREM) is the digital forensics and incident response team lead for Motorola Solutions’ managed security services organization. With 16 years of IT experience and 8 years of experience in security operations, She’s dealt with everything from aircraft avionics to conducting forensic analysis of sophisticated network intrusions. Lesley is the security blogger for Motorola Solutions Fresh Ideas in Public Safety and the author of “10 Commandments of Incident Response (for Hackers)”.

Back to Circle City Con 2015 Videos list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast