Session 8

Basics of Monitoring System Activity and Reporting Cybersecurity Incidents

Session 8: Basics of Monitoring System Activity and Reporting Cybersecurity Incidents

What do you do when you respond and recover to an incident? Who should you inform and how do you share information about your event? This session refreshes on the incident response lifecycle and links it to information sharing, drawing upon some previously discussed topics in threat and vulnerability management, which also relies on information sharing topics.

Solving Cyber Risk

Solving Cyber Risk

Connect With Us!

About The Hosts

Cyber risk is the peril of our generation, but organizations struggle to get actionable visibility to their risk. While technology can be part of the solution, it is not a silver bullet. Minimizing and managing cyber risk requires a comprehensive, continuous evaluation across processes, people, balance sheet controls, and technology.

Axio believes that everyone should have the means to solve their unique cyber risk challenges. We are a passionate team of cybersecurity, cyber risk, and business leaders who developed a unique and holistic methodology and software platform to deliver on that belief.

Our innovative and proprietary approach gives companies visibility to their cyber risk and cyber posture in a manner that enables the prioritization of investments to optimize the protection of their business, customers, and employees