Your password must be at least 8 characters and contain a number and letter.
• Identifying cybercrime typologies such as ransomware and Distributed Denial of Service attacks to promptly contain and isolate breaches
• Developing emergency response plans to conduct cyber forensic investigations, audit damage and restore IT infrastructure integrity
• Reporting incident and response plans to stakeholders including senior management, account holders, law enforcement and regulators
You must be logged in and own this session in order to