Inside Job: Data Breach

Based on a real-life cyber event from one of America's largest financial institutions, this scenario exercises the initial response protocols from an insider threat.

Based by a real-life cyber event at one of America’s largest financial institutions, this simulation explores the initial response to a critical insider threat. Sensitive data has surfaced on AI platforms and is rapidly spreading to less secure environments, putting organizational security and reputation at risk. Participants must navigate the breach response, focusing on containment, communication, and control validation.

Objectives:

  • Validate insider threat response protocols and/or playbook
  • Review of currency of access management controls
  • Validate internal communication protocols

this is where the syllubus goes

Additional information is here

No periods were set for this course

Microsimulations recognized in Gartner Hype Cycle for Legal, Risk, Compliance and Audit Technologies, 2024 Read more
+