Working Together to Prepare
for a Security Breach
It is vital that all departments work together after a security breach and initiate immediate corrective actions to mitigate any damage.
Unfortunately, this crisis-mode situation often causes departments to become even more disjointed, and finger-pointing and blaming take center stage.
Learn how to create a plan that will get all business units (and executives) on the same page so that actions and responses are coordinated, timely, and effective.
Working Together to Prepare for a Security Breach
Pandoblox Executive Partner
With experience in investment banking, mergers and acquisitions as well as 20 years in the IT industry, Henry balances the financial perspectives of Information Technology strategy, along with business goals, operational efficiency, and a holistic view of the IT environment. Experienced in structuring deals, executive management, architecting, and finance modeling, his over-arching view applies well to enterprises & small businesses.
Bob Van Dusen
Pandoblox Executive Partner & CISO
Bob is a global IT executive experienced in leading technology & security organizations for high profile brands like Blizzard Ent., City National Bank, and The Honest Company. With 14 years at Blizzard, he was able to grow the IT operations with 2 people to a global organization of 250 engineers, developers, managers, and executives supporting 5000 employees and millions of customers. He had back-office IT operations, production design and delivery technical operations, and enterprise cyber security all reporting to him. Having grown the business as a digital first business, he was pioneering DevOps before there was a word for it.
Silvia Van Dusen
SVP & Chief Human Resources Officer of LinQuest Corporation
Throughout her almost 30-year career in human resources, Sylvia has demonstrated her ability to transform the human resource culture into a service culture, making it an integral business partner within the organizations she has worked with. Currently, she not only oversees all human resources and corporate Communications activities across all business units as the chief human resources officer of LinQuest but also serves as the company's executive vice president as well.
Chief Information Technology Advisor at JPL
James Rinaldi is JPL's Chief Information Technology Advisor to the Office of the Director. He was the JPL CIO until October 2019, where he stepped out after 14 years. His current role is to create a future IT vision and strategy for the Lab looking out to 2025 and beyond. As CIO, James had direct management responsibility over JPL's Information Technology Directorate. Works closely with JPL management, supporting end users of the engineering, interplanetary network and finance/business operations. James sat on the JPL Executive Council and various management councils. He developed the IT strategy, budgets and executed major IT contracts. He actively participated in NASA IT governance councils. Early career roles include CIO at U.S. FDA, CIO at the IRS.
Pandoblox Executive Partner
Roberto Orci is the CEO and Chairman of Acento, an independent Hispanic advertising, promotions and PR agency, founded in 1983. Roberto Orci's 30 years in marketing and advertising in Mexico, Canada and the US make him a leader in his field. Previously, he was a brand manager at Procter & Gamble (Mexico), VP Management Supervisor at Ogilvy & Mather in the US, Canada and Mexico; and until 2002, President of the fourth largest independent Hispanic agency in the US. Roberto also serves on the Advisory Board for Cal State University School of Business. Roberto Received his BBA in Finance from the University of Houston and his MBA from Thunderbird Graduate School of International Finance.
A cyber attack occurs every 11 seconds and costs an average of $13 million to organizations affected. Attacks are increasingly destructive and now take on many forms. The stakes are simply too high to ignore this information.Today, it's not a matter of if an organization will be targeted by cyber criminals, but when.
This informative webinar does not focus on protecting you from the types of threats you and your team may face, such as Malware, Ransomware, Data Hacks, or Insider Attacks. Instead, it focuses on what to do after a security breach.
Few companies have experience successfully navigating major security crises while in the hot seat.
This webinar will show you exactly what needs to be done in the minutes and hours after a breach, and will help you create a Cyber Security Incident Response Plan (CSIRP) to guide you through this turbulent situation and direct the actions of all impacted departments.