Learn how to handle evidence in the aftermath of a cyber attack
Learn how to handle evidence in the aftermath of a cyber attack
As the world becomes more interconnected and businesses collect more customer data, it increases their vulnerability to cyber crime. Apart from external threats, businesses often neglect the risk of insider threats. Insider threats can cause serious damage to your business as employees are often granted access to sensitive data. This makes it hard to detect such threats.
Upon detecting a potential cyber breach, proper forensic procedures could determine whether the outcome is a successful resolution or a debilitating IT-enabled disaster. Our training will empower you to perform forensic triage and equip you to handle evidence in a professional manner. We also provide guidance on personnel screening and an employee profiling program through policies, asset management, control measures and social media intelligence.
Courses: