Training

Governance & Risk Management , Incident & Breach Response , Managed Detection & Response (MDR)

2015 Breach Preparedness and Response Study: The Results

2015 Breach Preparedness and Response Study: The Results

How well prepared are organizations to respond to a potentially devastating data breach - such as the likes that hit Anthem, OPM or even Ashley Madison? Are their security programs and controls truly as effective as security leaders believe them to be? These are among the questions answered by the results of the 2015 Breach Preparedness and Response Study.

Join FireEye CTO Grady Summers, and ISMG VP Tom Field, for an overview and analysis of this important new survey, with emphasis on:

  • Where organizations are most and least prepared for an attack;
  • Current security controls deployed for detection and response;
  • The 2016 agenda: What are the top planned investments for improved breach response?

Background

In 2015, we revisited information security leaders to gauge, not just the deep impact of these breaches, but the state of global organizations to prepare for and respond to such devastating attacks.

The results of the 2015 Breach Preparedness and Response Study will determine just that: How well fortified are organizations to prepare for and respond to the inevitable? Are their security programs and controls truly as effective as security leaders believe them to be?

Join this results webinar as we share our findings on the survey results which revealed:

  • Top threats to organizations;
  • Top threat actors, including criminals, hacktivists and nation-states;
  • 2016 spending priorities, including which new technologies will be deployed to help detect and prevent breaches.

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.