The ISACA lunch is a simulated cybersecurity incident. Legal and PR/communications experts have created a hypothetical cybersecurity data breach, ripped right from the current data breach headlines. Designed to mimic the way that a typical data breach incident unfolds, our tabletop exercise will begin with a basic factual scenario (e.g., FBI contact about employee personal data on the dark web; a blog post speculating about a potential security incident, customer complaints of identity theft or fraud). Then, over the course of the exercise, our facilitators will inject new facts into the situation, and give participants a chance to discuss response measures, tactics, and strategies. Our facilitators will guide participants, highlighting best practices and potential pitfalls based on their experience responding to hundreds of similar incidents over the last three years. At the conclusion of the exercise, the facilitators will provide comments and critique of the participants, and offer additional insights into breach incident response.
CLE Credits Available: N