Incident Response Boot Camp

Incident Response Boot Camp Are You Ready For When A Cyber Incident Occurs?

Today, most businesses and charities are reliant on online services, which exposes them to cyber-attacks and data breaches.  It is no longer “if” your organization will suffer a cyber incident but “when”.  Yet, statistics from the UK Cyber Security Breaches Survey 2018 show that “while over four in ten businesses experienced a cyber security breach or attack in the last 12 months – less than one in three had a formal cyber incident response plan.”

This Bootcamp will allow you to check your organization’s cyber incident response plan against best practices or help you to create a response plan if you don’t already have one!  It will guide you to the best practices for responding to a cyber incident and the technologies that can help to reduce its impact.  It will also help you to choose the kinds of partners that you may need when an incident occurs.

After attending this bootcamp you will be able to:

  • Justify why a cyber incident response plan is needed.
  • Identify the people and their roles in executing this plan.
  • Detail the critical steps that the cyber incident response plan must cover.
  • Explain the communications that are required as part of the response.
  • Be better prepared to respond to future cyber incidents.

The consequences of not being prepared can be severe.   It increases the risk to your business by failing to promptly identify what has happened at what data is affected.  Your organization may be subject to additional financial penalties for failing to properly manage the incident.  As well as suffering reputational damage, your organization will lose customers and revenue.   

Attend this bootcamp to make sure that your organization is prepared.


8:30:00 AM Welcome coffee
9:00:00 AM Introductions and overview
9:30:00 AM Scenario - who is involved and discussion
10:00:00 AM An incident occurs what do you do?
10:30:00 AM Break
11:00:00 AM Triage and Escalation
11:30:00 AM Identification and containment
12:00:00 PM Communication and video
12:30:00 PM Lunch
1:30:00 PM Eradication
2:00:00 PM Retest & restore
2:30:00 PM Notification
3:00:00 PM IBM Video
3:30:00 PM Wind up
4:00:00 PM End

Register for the joint Cybersecurity Leadership Summit / Cyber Access Summit and attend this Boot Camp for a reduced fee

Book your CSLS / CAS 2019 Conference+Boot Camp ticket and visit "Incident Response Boot Camp” for a reduced price.

Get more information about the Cybersecurity Leadership Summit 2019 / Cyber Access Summit 2019, Nov. 12-14, 2019 in Berlin / Germany

Book together and get your ticket here

KuppingerCole Boot Camps

KuppingerCole Analysts organize various bootcamps where you can keep yourself informed about the latest techniques and trends in identity management, cloud access and security. Bootcamps are more informative than other presentation formats. It offers intense interaction possibilities, is dense with new information and is a perfect medium to equip attendees with practical skills and confidence in a specific subject by sharing experiences, learning new skills and techniques.


Alexei is an analyst with specific focus on cybersecurity. His deep technical understanding allows him to support customers even with complex architectural and security challenges. Previously he has served as KuppingerCole's CTO. After graduating with an MSc degree in Mathematics and...

Location / Hotels

Humboldt Carré

Humboldt Carré

Behrenstraße 42 • 10117 Berlin • Germany
Phone: +49 (0) 30 20 144 85 0

Event Location


Boot Camp

Incident Response Boot Camp

Registration fee:
€950.00 $1187.50 S$1520.00 10450.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Nov 12, 2019 09:00-16:00 Berlin

Popular Videos

Next Webinar


Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00