It takes minutes to get inside. Days to exfiltrate. Detection can take weeks, maybe months. The impact is huge: lost revenue, increased costs, and damage to your organization’s brand. You can’t completely stop breaches from happening, but you can remediate the direct and indirect costs they can have on your organization. By taking a proactive stance, you can properly plan and budget for the costs associated with a breach. Through early detection and rapid response, you can obviate the need to notify affected customers and reduce the costs associated with notification. This webinar will cover: • How a “data breach” is defined, legislated, and how they occur • Direct and indirect costs facing organizations that are breached • Differences between “left of breach” (proactive approach) and “right of breach” (reactive approach) by exploring real-world examples • How early detection and rapid response can drive down the cost of a breach. About the presenters: Keith Lowry, Senior Vice President, Nuix USG Keith has more than 25 years of experience implementing, managing, and directing insider threat, counterintelligence, and intelligence collection programs. He is a former law enforcement officer and High-Technology Crime Unit detective with the City of San Jose California and a United States Navy Mobilized Reservist. He also served as Chief of Staff to the Deputy Under Secretary of Defense for Human intelligence, Counterintelligence and Security at the Pentagon, and as an information security consultant in the private sector. Harlan Carvey, Director of Intelligence Integration Harlan began his career in information security 28 years ago. After serving on active duty with the United States military, he transitioned to planning, coordinating, and executing vulnerability assessments. He then went on to digital forensics and incident response, which in turn led to targeted threat hunting and response.

Hora

18:00 - 19:00 hs GMT+1

Organizador

Nuix Thought Leadership Webinars
Compartir
Enviar a un amigo
Mi email *
Email destinatario *
Comentario *
Repite estos números *
Control de seguridad
Agosto / 2025 272 webinars
Lunes
Martes
Miércoles
Jueves
Viernes
Sábado
Domingo
Lun 28 de Agosto de 2025
Mar 29 de Agosto de 2025
Mié 30 de Agosto de 2025
Jue 31 de Agosto de 2025
Vie 01 de Agosto de 2025
Sáb 02 de Agosto de 2025
Dom 03 de Agosto de 2025
Lun 04 de Agosto de 2025
Mar 05 de Agosto de 2025
Mié 06 de Agosto de 2025
Jue 07 de Agosto de 2025
Vie 08 de Agosto de 2025
Sáb 09 de Agosto de 2025
Dom 10 de Agosto de 2025
Lun 11 de Agosto de 2025
Mar 12 de Agosto de 2025
Mié 13 de Agosto de 2025
Jue 14 de Agosto de 2025
Vie 15 de Agosto de 2025
Sáb 16 de Agosto de 2025
Dom 17 de Agosto de 2025
Lun 18 de Agosto de 2025
Mar 19 de Agosto de 2025
Mié 20 de Agosto de 2025
Jue 21 de Agosto de 2025
Vie 22 de Agosto de 2025
Sáb 23 de Agosto de 2025
Dom 24 de Agosto de 2025
Lun 25 de Agosto de 2025
Mar 26 de Agosto de 2025
Mié 27 de Agosto de 2025
Jue 28 de Agosto de 2025
Vie 29 de Agosto de 2025
Sáb 30 de Agosto de 2025
Dom 31 de Agosto de 2025

Publicidad

Lo más leído »

Publicidad

Más Secciones »

Hola Invitado