Got hacked? It’s too late to run now!

Webinar recording and presentation materials.

Author: Emma
Date: 04.11.2016
Read Time: 1 Minutes

When a cyber security incident occurs, you need to understand exactly how the attack happened, so you can plan the best way to respond. Earlier this week, we hosted a webinar where our cyber security expert, Janne Kauhanen, talked about incident response.

What do you do when you encounter a security incident? Our cyber security consultants are experienced in helping companies of all sizes with incident response. This process typically consists of five phases:

  1. Initial analysis & briefing
  2. Identification
  3. Containment
  4. Recovery
  5. Aftermath

In this webinar, Janne will walk you through each step and share practical advice and insights based on our experience from the field. In addition, Janne talks about forensic investigation and crisis management exercises, and gives you some tips on how to resource your cyber security operations to effectively handle incident response.

If you have questions on any topics presented in the webinar, please feel free to get in touch with us.

Enjoy the webinar!

Download the “Got hacked webinar slides or learn more at our SlideShare page.


Missed the previous episodes? Revisit them now!

Webinar #1: 10 reasons why organizations keep on failing in security management

Webinar #2: Prevention is the cornerstone of cyber security

Webinar #3: How to detect a cyber security breach? – The dos and don’ts

2 thoughts on “Got hacked? It’s too late to run now!

    1. The “how”s are as varied as the attackers themselves. I would say opportunistic attackers typically have a specific vulnerability in mind, and they’re just scanning the width of the internet to find services with this particular vulnerability. So you’ll get targeted just because you’re vulnerable. More targeted attacks on the other hand occur either because the attacker has a bone to pick with your organization and/or the agenda represented by your website, or because they have something to gain: you’re just a juicy target that will get them into the headlines or you may have information or access that they want. Maybe you’re just a business that’s making money, and they want to scam some of that money.


Post Comment

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s