The Security Consortium Offers Incident Response Course Focused on People, Plans and Processes to Enhance Business Performance

Share Article

Curriculum Focuses On Helping Attendees Form Critical Defensive Weapon To Ensure Business Continuity While Expanding An Organization's Security Posture Class Date: November 11 - 12, 2009 Webinar & Half Day Live Workshop

Incident response is playing an increasingly important role in the security and continuity management programs of organizations, and an effective enterprise-wide incident response plan needs to coordinate not only technology solutions, but the personnel and organizational processes needed to solve these problems

The Security Consortium (TSC,) a leading IT security testing, research and corporate counsel services organization, today announced the return of its popular Incident Response and Continuity Planning course, part one of its comprehensive security education offering. Recognizing the growing demands for quality information security training, TSC offers security technology education designed to educate professionals across all functions on how to build a complete solution encompassing the technology, the people and the processes required to create a truly secure environment. To register immediately, go to or call (408) 971-0984 for more information.

"Incident response is playing an increasingly important role in the security and continuity management programs of organizations, and an effective enterprise-wide incident response plan needs to coordinate not only technology solutions, but the personnel and organizational processes needed to solve these problems," said Mark Kadrich, TSC CEO. "The key is to be able to fortify the organization's security posture while remaining nimble enough to enhance business performance."

A growing body of disclosure law governing security breaches and data loss incidents, coupled with "professionalization" of the threats, is fueling an expanded focus on incident response, digital forensics, evidence collection, and proactive fraud detection. In addition, government and industry regulations require not only the aggregation of data and event management but also the ability to identify and remediate incidents. This is supported by research indicating that the digital forensics market will exceed $4.8 billion by 2011.

However, incident response is more about processes and procedures than a suite of products. Previously, IT security was perceived only in terms of its associated technologies such as antivirus software, security appliances, or authentication tokens. Technology can accelerate incident response tremendously, but, in the end, it's the staff that actually identify if an incident occurred, and if so, manage the event to minimize the impact to organizational assets and reputation. Technology might be used to instrument the network and servers, showing attack indicators or trends, but it cannot fix the problem. It's the processes, people, and technology together that form an effective incident response plan. Taking the time to implement all of the necessary elements needed to form this plan makes incident management more efficient allowing the organization to act in a consistent, logical manner.

Attendees will be introduced to the incident command system (ICS) and will learn how to craft and implement an incident response / business continuity planning program which relies on it. A special emphasis will be placed on the requirements, responsibility, processes and procedures needed to provide a rapid and reliable incident response capability. Students will learn how to identify potential issues between management, public relations and legal counsel before they happen, how to deal with government and law enforcement officials, and understand how and when to engage forensic procedures.

The class will be taught by Ron LaPedis, a TSC Subject Matter Expert who is a specialist in information security and continuity planning. LaPedis spent 25 years with Hewlett Packard performing these functions and has authored many articles and white papers on these topics. LaPedis is a Master Business Continuity Professional (MBCP), a member of the Business Continuity Institute and is a Certified Information Systems Security Professional (CISSP) with Information Systems Security Architecture Professional (ISSAP) and Information Systems Security Management Professional (ISSMP) endorsements. He holds one storage patent and is a co-inventor on two virtualization patent applications.

The class will be held November 11th and 12th, 2009. The first day's live session will be broadcast as a webinar simultaneously while day two is a half day workshop enabling participant teams to build an incident response plan in real time for an imaginary company. The two day live session to be held in San Jose, California, costs $1,425.00 while the webinar alone is $995. Continuing education credits and discounts may apply to certified security and business continuity professionals. Please register online at or call 408/971-0984 for more information.

About The Security Consortium:
Design, testing, counsel and leadership services from The Security Consortium (TSC) provide companies with the ability to balance the need for security with business objectives. TSC brings together design, network and product expertise with testing and process feedback to create competitive advantage for companies. By focusing on overall business results instead of narrow test requirements, TSC helps companies improve the processes used to create, purchase, and operate security products. The result is competitive advantage for both buyers and sellers through lower TCO, better quality and usability, fewer security vulnerabilities and more successful deployments. TSC is a privately held company, founded in 2007 located at 1630 Oakland Road, Suite A217 in San Jose, California.

Further information on TSC is available at or contact
Deva Loveland at +1 408.971.0984.

Copyright © 2009 The Security Consortium, Inc. All rights reserved. TSC, TSC Wireless, The Security Consortium, and other TSC products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of The Security Consortium, Inc. All other product and service names mentioned are trademarks of their respective companies. Information in this document, including data, is for informational purposes only and is subject to change without notice. These materials are provided by The Security Consortium and its partners or affiliated companies without representation or warranty of any kind, and neither The Security Consortium, its affiliates or partners will be liable for any errors or omissions. The only warranties for The Security Consortium products or services are those set forth in the express warranty statements accompanying such products or services, if any.

# # #

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Robin Lutchansky
Visit website