Anatomy of a Data Breach Table Top
September 04, 2025 8:30 AM ETThis course covers the five stages of a cyber breach: (1) Preparation; (2) Detection and Analysis; (3) Containment, Eradication, and Recovery; (4) Post-Incident Activity; and (5) Reporting. The course will provide an in-depth analysis of the necessary steps and activities for each stage, the identification of employees and outside experts involved in each stage, associated costs and damages and risks to the organization. The course will generally cover the tools that are available to accomplish the tasks for each stage.
Back to top