All Events and Webinars

Minimise the Impact of a Data Breach with Incident Response and Data Recovery Strategies

Cross Industry
September 13, 2023
Most data breaches don’t happen in surprising ways, they follow predictable patterns, but organisations still struggle to respond effectively. This session focuses on what actually determines impact once an attacker gets in. Viewers will learn how to improve incident response, meet regulatory timelines, and build the coordination and readiness needed to contain breaches before they escalate into major crises.

In-House Specialists

Ronan Murphy

Founder and Executive Chairman
View speaker profile

Alexandru Sandu

Director of Security Operations Centre
View speaker profile

Featured Guest Speakers

Mike Kehoe

Threat MGMT Director

Key Strategic Takeaways

Cybercrime Is Now an Industrialised Business
Phishing Remains the Primary Entry Point
Speed of Containment Determines the Outcome
Most Breaches Escalate Due to Poor Preparation
Continuous Monitoring and Improvement Reduce Blast Radius
  • 00:08 Introduction to incident response and data recovery strategies
  • 01:59 Evolution of cybercrime into organised, industrialised operations
  • 03:57 Rise of phishing-as-a-service and the importance of user awareness
  • 06:06 Automated attacks and how attackers escalate after initial access
  • 07:39 Defence-in-depth and why layered security is critical
  • 09:53 Real-world incident response challenges after credential compromise
  • 13:07 “Left of boom” vs “right of boom” and regulatory pressure (72-hour rule)
  • 15:49 Importance of preparation, zero trust, and incident response rehearsals
  • 18:07 Why organisations fail during breaches due to lack of planning
  • 22:18 Real incident example: credential compromise and successful containment
  • 27:04 Speed of attack execution and need for rapid response capability
  • 31:20 Continuous improvement and adapting to evolving threats
  • 34:23 Dark web access markets and internal foothold risks
  • 36:48 Threat intelligence and proactive detection of “indicators of concern”
  • 38:31 Why large organisations still fail despite heavy cyber investment
  • 42:21 Best practices: threat hunting, vulnerability prioritisation, and monitoring
  • 44:32 Embedding cybersecurity into business strategy, not as an afterthought
Watch More
No items found.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365