Digital Forensics Following Cyberattacks: What You Must Know And Do

with
Art Taryan
Live Session
$129.00
  • June 7, 2021, 1:30 pm   EST
Training Includes:
  • Certificate of Attendance
  • All resources and training materials
  • An on-demand recording will be available after the live presentation.

Cybersecurity consultant Art Taryan will help you thoughtfully prepare for the inevitable. You will learn how to be ready when hackers strike your organization.

Topics covered

  • MITRE ATT&CK framework
  • Typical hacker techniques and tools
  • Incident response process
  • Incident management best practices
  • Live Windows examination
  • Network investigations
  • Memory investigations
  • Malware investigations
When:
Monday, June 7, 2021; 1:30 PM Eastern
Scheduled for 60 minutes including question and answer period.

Training Overview

Don’t be the next Colonial Pipeline. Learn how to respond to an inevitable cyberattack.

The Colonial Pipeline attack that continues to cause gasoline disruptions in the southeast US was the latest demonstration of the increasing cybersecurity risk that all organizations face. To end that event, the desperate Colonial Pipeline CEO paid a $4.4 million ransom. Despite heightened vigilance after the widespread SolarWinds attack announced in December, systems in financial institutions, businesses, schools, and other organizations continue to be plagued by relentless hackers.

You need to know how to respond to a successful cyberattack on your organization before confusion and fear take over. To interface with the incident response and digital forensics analysts who quickly spring into action during a crisis, you must understand how they verify, contain, and eradicate a threat.

It is helpful for you to have advance insight into the following cybersecurity areas:

  • MITRE ATT&CK framework
  • Typical hacker techniques and tools
  • Incident response process
  • Incident management best practices
  • Live Windows examination
  • Network investigations
  • Memory investigations
  • Malware investigations

Who Should Attend?

  • Financial institution personnel
    • Executives
    • Operations managers
    • Electronic banking managers
    • Information security officers
    • Risk management staff
  • Business leaders
    • Corporate executives
    • Information security officers
    • Information technology personnel
    • Public relations managers
    • Small business owners
  • Higher education administrators
    • Presidents
    • Chancellors
    • Provosts
    • Vice presidents for administration
    • Information security team members
  • School leaders
    • Superintendents
    • Deputy, associate, and assistant superintendents
    • Principals and heads of private schools
    • Directors of technology
    • Public information officers
    • School board members

Expert Presenter

Art Taryan

  • 14 years of experience in risk/threat and project management within multiple Fortune 500 companies and the US military
  • Focuses on cyber threat intelligence, threat modeling, insider threat, incident response, and counter fraud
  • Leads the threat intelligence efforts within Cross Country Consulting’s Cyber & Privacy group
  • Previously an Army officer, including supporting real-world defensive and offensive cyber operations alongside the NSA