Post-breach analysis can be frustrating for CISOs. Even when full forensic probes are completed within a week of an attack, those results have limited reliability and may be contradicted by subsequent investigations. Given the SEC requirement of reporting findings within four days of an attack, an inability to immediately identify attack details creates massive compliance issues. 

About the speaker

Rich Greco
Rich Greco, Global Head of Critical Incident Response at Wipro, explains the different methods of data capture that can help to identify the details of an attack within hours of its discovery.

About the host

Evan Schuman
Evan Schuman, a veteran IT journalist, currently writes for DarkReading and Computerworld. His byline has appeared in articles for numerous media companies, including The New York Times, Associated Press, Reuters, SCMagazine/SCMedia, VentureBeat, TechCrunch, and eWEEK. Evan has been been quoted on security issues in The Wall Street Journal, The Washington Post and Time, among others. He has consulted on cybersecurity content issues for Microsoft, Capital One, BlackBerry, Harvard Business Review, SAPPfizer, Oracle, AT&T JPMorgan, HP Dell and MIT, and regularly lectures on cybersecurity topics at Columbia University and New York University.