6 steps to effective incident response

By Dale Meredith

Organizations today are under constant cybersecurity attack. It’s only a matter of time before someone in your organization reports an incident that could jeopardize your company—and your customers. What do you do? Who needs to know? How do you proceed? These questions should all be answered before a real incident takes place, and your responses need to be thorough and executed in a timely and effective manner.

Get a game plan in place. Join Pluralsight author and cybersecurity professional Dale Meredith as he highlights the first six steps you should take when a real incident happens, and get a deep dive into 

  • Different ways to contain the breach

  • How to determine who was affected by the breach

  • How to handle the fallout of the breach

Meet our presenter

About the author

Dale Meredith is a high-demand contract Microsoft Certified Trainer and project consultant. Along with his 17 years of experience as an MCT, Dale also has an additional 7 years of senior IT Management experience. Dale worked as a CTO for a popular ISP provider and a Senior Manager for a national hardware supplier. His technology specialties include Active Directory, Exchange, Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud. Dale's wide network of IT contacts stay connected through his popular blog site at www.dalemeredith.com.