May 2021 Webinar
Incident Response: After a Breach is Detected
Notice: See below for CPE Policy.
An overview of a real-life incident involving a system breach of a company’s cloud infrastructure by a bad actor outside of the US via a spear phishing attack, resulting in a misappropriation of assets. The speaker will review the roles and responsibilities of the various operational units within the company during the incident response and recovery process. The speaker will discuss the procedures used at time zero of the breach detection and afterwards between multiple business units to prevent additional exposure, determine the total impact to the company, root cause the breach, implement controls internally to prevent recurrence, and additional business required from the company’s vendors.
More than ever, companies are relying on online platforms—like websites, social media, and team chat tools—to communicate both internally between employees and externally with customers and other stakeholders. But these online sources generate incredible amounts of records in real-time, creating unprecedented information governance and data loss prevention challenges.
There are no upcoming events to display at this time.
About Our Speaker
Carl Grifka, CISM, CISA, PMP, CDPSE, LSSGB
Principal, Newport Consulting LLC
Carl is a dynamic Finance and IT leader specializing in finance, IT security/risk, project
management, lean process design, and risk advisory solutions. Carl is leading Newport
Consulting LLC’s IT consulting division and new international Flex Specialist Center.
Carl is also the CFO of leading Cinionic’s global initiatives to finance new OPEX service
models in the cinema industry. Prior to joining Newport Consulting LLC and Cinionic,
Carl was a Consulting Manager at RSM LLP specializing in IT and Finance advisory, a
lead corporate auditor at General Motors, and a revenue agent for the Internal Revenue
Service. Carl has a M.S. in Finance from the University of Michigan and a B.A. in
Accounting from Michigan State University. He also has a Certificate in Executive
Leadership from Cornell University. Carl also holds the Certified Information Security
Manager (CISM), Certified Information Systems Auditor (CISA), Project Management
Professional (PMP), Certified Data Privacy Solutions Engineer (CDPSE), and Lean Six
Sigma Green Belt certifications.
Timothy Towne, CISSP, ISSEP, CCSP, CMMC
Cybersecurity Engineer, INE Solutions.
Timothy Towne is a certified cybersecurity engineer with over 25 year’s experience in the U.S. Intelligence and DOD space. Tim currently works with small and medium size commercial companies to help them understand and implement cybersecurity governance and technologies.
Tim believes providing timely analysis and information to decision-makers is key to developing an organization’s overarching tactics, techniques, and procedures (TTP) to deal with today’s evolving threats and vulnerabilities.
Tim has worked with several C-level equivalent government personnel to deliver timely and effective decision-making processes and procedures, including tools for documenting and tracking system security vulnerabilities and recommending viable remedial TTPs.
Tim holds the Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified Cloud Security Professional (CCSP), Security+CE certifications as well as the Cybersecurity Model Matrix Certification (CMMC) Registered Practitioner (RP) designation.
Tim holds an MBA in Management Information Systems from California Southern University as well as bachelor’s degree in percussion performance from California State University Dominguez Hills.
Andy Portillo, CISSP, CISA, CDPSE, OSCP, GEVA, GWAPT
Cybersecurity SME, Newport Consulting LLC & Vulnerability Assessment Manager
Part-Time Lecturer, University of Southern California
Andy Portillo brings with him over seven years of experience in a wide range of information technology (IT) and cybersecurity disciplines, gaining extensive information security experience through roles including IT auditor (RSM), information security analyst, penetration tester and lecturer at a large R1 university (USC). Andy processes deep technical and experience in the financial, payment card and academia industries. Andy’s focus will be to aid in the end-to-end vulnerability remediation efforts across an organization and to provide an excellent customer experience throughout the entire process.
Andy has his Master of Science in Information Assurance and Cybersecurity from Capella University, and his Bachelor of Science in Information System and Cybersecurity from ITT-Technical Institute. He also possesses the following certifications: Certified Information System Security Professional (CISSP), Offensive Security Certified Professional (OSCP), GIAC Enterprise Vulnerability Assessor (GEVA), GIAC Web Application Penetration Tester (GWAPT), Certified Information Systems Auditor (CISA), and Certified Data Privacy Solutions Engineer (CDPSE), ISACA.
5:00 PM – 6:30 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
|ISACA, IIA, ISSA,
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.