Cyber attackers launch an attack every 6 seconds, and ransomware as a service is one of the fastest growing industries in the world. Meanwhile, data is now sprawled around the world – data centers, endpoints, SaaS applications, the cloud, and edge. There are so many new attack vectors for cyber criminals, that it is nearly impossible to build a moat around the company. Therefore, the question is not “will be breached?” but more “how do we handle our breaches?”
Historically, organizational silos have left gaps for cyber criminals to attack. Data protection teams have a unique perspective across all the data and applications in the organization, while security teams have a view across all the security events in the company. Unfortunately, even though data is the organization’s biggest asset, that information has not been integrated.
Now that cyber attackers are targeting data, security,data protection, compliance, and legal teams need to partner together. In this talk, we will cover best practices to manage attacks on an organization’s data. We will begin with how to limit the scope of an attack, detect attacks, and recover your data and applications. Then, we will walk through how to conduct forensic analysis and a legal assessment after the attack is over and the company is running again.