SouthWest Presentations

University of Central Florida: Post-breach Mitigation & Prevention Strategy 

05-04-2017 05:35 PM

How do you justify making a significant investment in protecting your PeopleSoft systems? Our customer - UCF - learned first hand following a highly publicized breach in January 2016. They had to balance the demand of law enforcement and lawyers with investigating the incident while preserving forensic integrity while moving to protect our systems. During this time, there were many costs associated with the data loss. We will discuss the hidden and direct costs on the organization as a whole as well as, the mitigation strategy moving forward. 

Find out what happens after a breach based on input from Felicia Kendall, IT Infrastructure Manager at UCF. Felicia was the tip of the spear charged with resolving the breach and coming up with the mitigation strategy. Topics we will discuss are:
• Actions after the breach
• Working with law enforcement 
• Working with Lawyers, Administration and constituents
• Breach costs 
o Direct 
o Credit monitoring
o Lawsuits
o Indirect 
o Internal resources
o Time
o Insurance adjustments
o Brand identity
• Mitigation Strategy 
• Protection moving forward
o Two-Factor authentication
Lessons learned

0 Favorited
0 Files

Related Entries and Links

No Related Resource entered.