United States

Cybersecurity and data breach preparedness webcast series

It’s not a matter of if, but when you’ll experience a data breach

RECORDED WEBCAST  | 

With today’s advanced threats and rapidly evolving malware, your company faces data security risk exposures from internal and external sources every day. Not only is the complexity and number of cybersecurity incidents steadily rising, but so is your organization’s financial and reputational risk to harm. 

Unfortunately no organization of any size or industry is completely safe against cyberattacks. While you may not think you are a target, attackers will attempt to make money from any viable opportunity that crosses their path. This creates a situation in which it is not a matter of if, but when, you will experience an incident.

Identifying and mitigating vulnerabilities are important to reduce the likelihood of a breach, but you must assume that preventative controls will fail at some point. Limit the potential of an incident actually resulting in damages and if damages occur, minimizing them as much as possible.

In this thre-part webcast series, RSM will help you understand how to step up your security posture and data breach preparedness.

Part 1 - Preventive controls

Download webcast slides for Part 1 - Preventive Controls

Wednesday, Feb. 18, 2015
Presenters - Rob Havelt, Daimon Geopfert

Develop effective controls to help you harden your internal and external environment and reduce the likelihood that you will be breached


Part 2 -  Detective controls

Download webcast slides for Part 2 - Preventive Controls

Wednesday, Feb. 25, 2015
Presenters - Jim Lepine, Daimon Geopfert

Implement controls to  help identify whether preventative controls have been bypassed as early as possible to begin your response before much, if any, harm is done


Part 3 - Corrective controls

Download webcast slides for Part 3 - Corrective Controls

Wednesday, March 4, 2015
Presenters - Andy Obuchowski, Daimon Geopfert

Put corrective controls into place, allowing your organization to conduct an effective data breach response plan to limit technical, business, reputational and legal damages

Event Information

Who Should Attend
All job titles containing security and privacy, internal audit and compliance, board members, chief risk officer, chief information officer, chief financial officer, chief audit executive and any other c-level executives focusing on data and privacy within their organization

CPE Credit: One CPE credit available for each webcast

More Information:

Email: Blair Doyle
Phone: 312.634.5323