Discover this podcast and so much more

Podcasts are free to enjoy without a subscription. We also offer ebooks, audiobooks, and so much more for just $11.99/month.

The Inside Line on Information Protection: How to Develop an Incident Response Plan

The Inside Line on Information Protection: How to Develop an Incident Response Plan

FromProtecting People


The Inside Line on Information Protection: How to Develop an Incident Response Plan

FromProtecting People

ratings:
Length:
35 minutes
Released:
Aug 12, 2021
Format:
Podcast episode

Description

What is it that we didn’t know that we should have known?
Many incident response plans miss this crucial question, but it’s absolutely foundational to learning how you can prevent the incident from happening again.
In this episode, we talk with Matt Stamper, CISO at EVOTEK, about the most important elements of an incident response plan and why security awareness has the largest return from a threat mitigation perspective.
What we talked about:
- Getting started with incident response
- Untangling conflicting priorities in the process
- Widening the circle of concern with regard to insider threats
- Investing in security awareness
Check out these resources we mentioned during the podcast:
- TheHLayer.com 
- CISO Desk Reference Guide: A Practical Guide for CISOs (Vol. 1) 
- CISO Desk Reference Guide: A Practical Guide for CISOs (Vol. 2) 


For more episodes like this one, subscribe to us on Apple Podcasts, Spotify, and the Proofpoint website, or just search for P rotecting People in your favorite podcast player.


Listening on a desktop & can’t see the links? Just search for Protecting People in your favorite podcast player.
Released:
Aug 12, 2021
Format:
Podcast episode

Titles in the series (100)

Today’s cyber attacks target people, not technology. Protecting People is a podcast focused on the human side of cybersecurity. Each episode, you’ll learn how today’s threats really work, who’s being targeted by them, and what you can do to safeguard your people, data and systems.Get real-world insight and learn about the latest trends in social engineering, malware, threat protection, cloud security and more. Protecting People is cybersecurity for the rest of us.