Webinar: Building a Ransomware Response Playbook for Network Resilience

Preparation is key to security. When there is a security incident – Do you know what to do? Do you know what to do after that? A proper incident response plan considers all the potential scenarios and outlines all the steps to take to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business running.

In this webinar, learn how to ask the questions necessary to build the incident response playbook that fits your organization. Think about compliance, customer communications, and business continuity. Learn how to test the playbook so that you know the plan is functional and effective. Don't make a data breach any harder than it needs to be.

During this webinar you will:

  • Get expert advice on building an effective incident response playbook
  • Find out how to develop and maintain a successful backup strategy
  • Explore available tools to support network resilience and help enterprises recover from a cyber incident

Gated Video

Webinar

Webinar: Building a Ransomware Response Playbook for Network Resilience

Webinar: Building a Ransomware Response Playbook for Network Resilience

Preparation is key to security. When there is a security incident – Do you know what to do? Do you know what to do after that? A proper incident response plan considers all the potential scenarios and outlines all the steps to take to contain the damage, eliminate the threat, avoid destruction of forensic evidence, and keep the business running.

In this webinar, learn how to ask the questions necessary to build the incident response playbook that fits your organization. Think about compliance, customer communications, and business continuity. Learn how to test the playbook so that you know the plan is functional and effective. Don't make a data breach any harder than it needs to be.

During this webinar you will:

  • Get expert advice on building an effective incident response playbook
  • Find out how to develop and maintain a successful backup strategy
  • Explore available tools to support network resilience and help enterprises recover from a cyber incident
No Details required
Thanks, your request has been received
A member of our team will be in touch with you shortly.
Oops! Something went wrong while submitting the form.
The information provided in this document is intended for general informational purposes only and should not be construed as legal advice. For specific advice related to compliance with NIS2 or other legal matters, please consult with your legal, professional or regulatory advisors. Darktrace makes no warranties or representations regarding the accuracy, reliability, or completeness of the information provided and accepts no responsibility for any errors or omissions. This document may contain links to external websites or resources for additional information. Darktrace does not endorse or assume responsibility for the content, privacy practices, or any other aspect of these external sites.

This white paper includes

This resource includes

This case study includes

This data sheet includes

9000+
Companies trust Darktrace
Share this resource