This interactive session will take attendees through a constantly morphing set of incident response scenarios covering top data breaches. Attendees will be split up into groups representing security, legal, privacy, board, execs, pr/marketing, and business lines as we go through scenarios affecting intellectual property, ransomware, hacking, reputational, social media, and bug bounty incidents.
This session will follow Chatham House Rule to allow for free exchange of information and learning. We look forward to participants actively engaging in the discussion, and remind attendees that no comment attribution or recording of any sort should take place.
This is a capacity-controlled session. If added to your schedule and your availability changes, please remove this session from your schedule to allow others to participate.