What happens after a threat is detected?

The best way to recover following a cyber attack

Add bookmark

There are a number of processes to follow in an organisation after a threat is detected. This response also depends on the type of a business and industry. In this fireside chat our guest speaker, Vladimir Krupnov from Revolut Bank, will share his thoughts on recovery following cyber security attacks, steps in the processes and challenges that many organisations are facing, such as: How to escalate and ensure correct procedures are followed. How to coordinate with other industry players. I...

RECOMMENDED