Cyber Security Incident Response (CSIRT)
  • CODE : MICH-0031
  • Duration : 60 Minutes
  • Level : Intermediate
  • Add To Calendar
  • Refer a Friend

Dr. Michael C. Redmond, PhD is Consultant, Speaker and Author. Her certifications Include: MBCP, FBCI, PMP, CEM   ISO 27001 Lead Implementer and Lead Auditor, as well as many other ISO certifications.

Michael also conducts ISO Certification Implementation and Audit Training for PECB. Michael is the Chapter President for Association of Contingency Planners Eastern Great Lake Chapter and an active member of ISSA.

She has consulted in the area of Cyber Security for clients in the arenas of Healthcare, Insurance, Financial and Manufacturing. Her projects have included:

  • SIEM Security information and event management  which is Combining  software products and services combining security information management (SIM) and security event management (SEM)
  • (CSIRT) which is Cyber Security Incident Response Programs, Plans, Playbooks, Training and Testing.
  • Audit of  CSIRT programs and documentation
  • Information Security Programs and Implementation

Michael has consulted in the fields of Business Continuity and Disaster Recovery in the areas of Healthcare, Insurance, Financial, Manufacturing, Education and Government.

She has 2 books which are coming out in 201yand are being published by one of the Top International Publishers in the world. The first is a Cyber Security book and the second is a Business Continuity and Disaster Recovery bookMichael has a series of Audio Training that receive CEU’s from Disaster Recovery Institute (DRI) and other certifications.                                                                  

They are:

  • Cyber Security Training for -  6 CEU’s 
  • Business Continuity Management for 20 CEU’s. 

Michael’s been honored as Top Woman in her field at a White House Luncheon and was selected out of the world to write the prolog for the chapter on RISK Management by the United Nations for their Disaster Book which was given to the head of state for every UN member nation.
She has recently been named on the list of “Women of Distinction for 2015” by Women of Distinction Magazine for her work in Cyber Security.

She was selected to speak on Cyber Security Incident Response and SIEM at such recent conferences as:

  • International ISSA Conference in Chicago
  • NYS Cyber Security Conference – Co Spoke with Acting CISO for New York State
  • ISACA Western New York Conference
  • Metric Stream Round Table in New York City

The best way forward is an efficient Incident Response Program that allows an organization to respond with speed and agility, while empowering businesses to maintain continuous operations. Such a solution also reduces revenue loss, reduces fines and lawsuits and protects brand reputation.

Information Security, Governance & Risk, are all critical aspects of planning and execution of the Information Security Plan. Who in your organization has key responsibility to develop an information security governance program; review existing Information Security policies and standards to ascertain their adequacy in coverage scope against industry best practices, and update them asappropriate, taking into account compliance recommendations?

Establish Key Performance Indicators (KPI) to determine if your Information Systems Incident Response program meets business objectives and operational metrics for ongoing process improvement.

Learn how to develop a  CSIRT Policies, Program, Plan, Playbook, Training and Exercises

Areas Covered

  • Adopting a systematic approach to risk tracking to enhance the effectiveness of the Cyber Incident Program
  • Outlining the critical actions to take if an event affects the company or its partners
  • Understanding an organizations’ susceptibility to a Cyber Attack
  • Cyber Incident Response: Getting started, research, training, testing and maintaining
  • Standards and Best Practice: ISO 27001, ISO 27035, ISO 27005, ISO 22316 NIST, FFIEC, HIPPA AND HITRUST

Course Level: Intermediate

Who Should Attend

Information Security Managers,CEO, CIO, CFO,  CSO, Technology Managers, Auditors

Why Should You Attend

Do you have great procedures in place to deal with a Breach, Malware and more? Are you willing to risk your Business Reputation on those procedures?

Unprecedented series of events have shaken the industry confidence in longstanding Internet trust models, consumer confidence in organizations’ abilities to protect their data, and organizations’ confidence in their ability to detect and deflect targeted attacks in a timely manner. Restoring trust requires stronger industry collaboration, new standards for a new threat landscape, and new security postures that shrink time to detection through the superior use of threat data.”

Topic Background    

Sony, Target, JPM Chase, and so many more have been targets of Cyber Crime.  Is your organization prepared if your business is targeted and your Business Operations are impacted.

  • $160.00



Webinar Variants


contact us for your queries :

713-401-9995

support at grceducators.com



  • Contact
  • Membership
  • Subscribe
  • Secure Payment