March 2025 ISACA Meeting - How to conduct an effective incident response drill

When:  Mar 25, 2025 from 12:00 to 13:00 (CT)
Associated with  San Antonio Chapter

Introduction:

In today’s fast-evolving cybersecurity landscape, organizations face a constant barrage of threats that can disrupt operations, compromise data, and harm their reputation. Incident Response Drills are a critical component of a proactive defense strategy. They simulate real-world cyber incidents, allowing teams to practice their response plans, identify gaps, and continuously improve their readiness.

This session, “Mastering Incident Response Drills: Strengthening Cyber Resilience,” is designed for industry professionals looking to enhance their incident response capabilities. We will guide you through the process of planning, executing, and evaluating effective drills that empower your team to respond swiftly and efficiently when a real incident strikes.

Objectives:

By the end of this training session, participants will:

• Understanding the Purpose of Incident Response Drills: Explain how drills prepare teams for real security incidents and ensure preparedness.

• Key Benefits of Conducting Regular Drills: Highlight benefits like improving response times, identifying weaknesses, and ensuring regulatory compliance.

• Alignment with Compliance Requirements and Industry Standards: Discuss how drills can help meet the requirements of frameworks like NIST, ISO 27001, and PCI DSS.

• Preparing Teams for Real-World Security Incidents: Emphasize the psychological and operational readiness achieved through well-conducted drills.

Speaker BIO:

KK is the Founder & CEO of Network Intelligence. Having begun his firm as a one-man show in 2001, it has now grown to a team of over 600 consultants spread across offices in New York, Delaware, Netherlands, Dubai, Mumbai and Singapore. He is a trusted consultant and trainer to organizations all across the globe on various aspects of cybersecurity. He is well-versed with the security challenges of various industry verticals, and also with international standards and frameworks such as ISO 27001, PCI DSS, COBIT, HIPAA, etc. In recent years, he has been involved in investigations of some of the major financial breaches. He is the author of two books (on Linux Security and the Metasploit Framework) and numerous articles on information security. Early in his career, he presented at Blackhat in 2004 (on ‘Detection and Evasion of Web Application Attacks’) and has spoken at numerous global conferences since then.

Location

Online Instructions:

Contact

Barbara Maldonado
2108578021
barbara.maldonado@rackspace.com