+Filter Categories
Adding Incident Response Containers To The Cyber
Security Tool Belt
TF7 Episode 143 with PayPal's Renana Friedlich
Seth Adler
 07/23/2020
"In order to perform a successful investigation, you are going to need to have access to
di erent tools in the environment." So says PayPal's Renana Friedlich. Beyond that, Renana
suggests to ensure that you know the criteria that you are investigating- number of users
impacted, regulatory risk to the company, etc." It's only at that point that an enterprise can
consider an incident response container.
An incident response container must be aligned with company processes. Renana notes that it's "absolutely critical
from a process perspective to have regular meetings with the provider to make sure that you really see things eye to
eye."
Finally, de ne roles and responsiblities for the best possible relationship moving forward.  
Episode Overview
The Global Head of Cyber Security Operations for PayPal, Mrs. Renana Friedlich, appears on Episode #143 of Task
Force 7 Radio to about one of the most important exercises in the Incident Response space: Incident Response
Retainers. Friedlich unpacks the entire retainer engagement, including why companies get a retainer, what are the
main bene ts of having a retainer, what types of retainers are available, should a company sign more than one
retainer, and what is the correlation between cyber security insurance and IR retainers? Frielich also spoke about
whether or not retainers should be signed through the Information Security team or the Legal Department, what are
some of the factors companies should be considering when choosing a provider, and what are common
misalignment mistakes companies make when engaging Incident Response Services. Don't miss one of the most
proli c Cyber Security Operations Professionals in the industry, Renana Friedlich on Ep. #143 of TF7 Radio.
Listen Now
Comments
You must Login or Subscribe to comment.
Too small!
Tags: Incident Response Regulatory Risk Cyber Security Insurance
Upcoming Events
Enterprise Architecture Asia
07/22/2020
Online Webinar
Register Now | View Agenda | Learn More
Cyber Security Leaders Exchange 2020
11 - 12 August, 2020
NOW 100% ONLINE
We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c.
To learn more about cookies, including how to disable them, view our Cookie Policy Close
RECOMMENDED
Register Now | View Agenda | Learn More
CISO Exchange August 2020
August 24 - 25, 2020
100% Online
Register Now | View Agenda | Learn More
Critical National Infrastructure 2020
September 15 - 16, 2020
Online Event
Register Now | View Agenda | Learn More
Cyber Security Digital Summit for Financial Services 2020
15 - 16 September, 2020
Learn More
Automotive Cybersecurity Online
October 06 - 07, 2020
Online Event
Register Now | View Agenda | Learn More
MORE EVENTS
Follow Us
     
Subscribe to our Free Newsletter 
Insights from the world’s foremost thought leaders delivered to your inbox.
SUBSCRIBE
Latest Webinars
Security Challenges in a Remote Worker World
 2020-08-26
 11:00 AM - 12:00 PM EST
In this roundtable discussion, experts in edge cloud architectures, cloud-based security, and remote...
CISO Perspectives: Zero Trust, Secure Access, and What’s Next
 2020-08-12
 11:00 AM - 12:00 PM EST
Workloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organ...
Engaging Your Line of Business for Cyber Security Initiatives
 2020-08-05
 10:00 AM - 11:00 AM EST
Security cannot be done in a silo. 34% of cyber security professionals see unaware employees as the...
MORE WEBINARS
We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c.
To learn more about cookies, including how to disable them, view our Cookie Policy Close
Adopting a Zero Trust
Security Model
[WATCH On Demand]
 2020-07-15
By Seth Adler
The Evolving Role Of
The CISO And Rise Of
Digital Risk [WATCH
On Demand}
 2020-07-15
By Seth Adler
Defending Holman
Webb with Cyber AI
[WATCH On Demand]
 2020-07-15
By Seth Adler
Putting the ‘Sec’ into
DevOps [WATCH On
Demand]
 2020-07-15
By Seth Adler
FIND CONTENT BY TYPE
News Case Studies
Interviews White Papers
Videos Podcasts
CYBER SECURITY HUB
COMMUNITY
Power10
About Us
Contact Us
Become a Member Today
Advertise with us
Cookie Policy
User Agreement
ADVERTISE WITH US
Reach Cyber Security professionals through cost-e ective marketing opportunities to deliver your message, position yourself as a thought leader,
and introduce new products, techniques and strategies to the market.
LEARN MORE
JOIN THE CYBER SECURITY HUB
COMMUNITY
Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles,
videos, live conferences and more.
SIGN UP TODAY!
Cyber Security Hub, a division of IQPC
© 2020 All rights reserved. Use of this site constitutes acceptance of our User Agreement and Privacy Policy.
Careers With IQPC | Contact Us | About Us | Cookie Policy
     
< >
We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c.
To learn more about cookies, including how to disable them, view our Cookie Policy Close

Adding Incident Response Containers To The Cyber Security Tool Belt

  • 1.
    +Filter Categories Adding IncidentResponse Containers To The Cyber Security Tool Belt TF7 Episode 143 with PayPal's Renana Friedlich Seth Adler  07/23/2020 "In order to perform a successful investigation, you are going to need to have access to di erent tools in the environment." So says PayPal's Renana Friedlich. Beyond that, Renana suggests to ensure that you know the criteria that you are investigating- number of users impacted, regulatory risk to the company, etc." It's only at that point that an enterprise can consider an incident response container. An incident response container must be aligned with company processes. Renana notes that it's "absolutely critical from a process perspective to have regular meetings with the provider to make sure that you really see things eye to eye." Finally, de ne roles and responsiblities for the best possible relationship moving forward.   Episode Overview The Global Head of Cyber Security Operations for PayPal, Mrs. Renana Friedlich, appears on Episode #143 of Task Force 7 Radio to about one of the most important exercises in the Incident Response space: Incident Response Retainers. Friedlich unpacks the entire retainer engagement, including why companies get a retainer, what are the main bene ts of having a retainer, what types of retainers are available, should a company sign more than one retainer, and what is the correlation between cyber security insurance and IR retainers? Frielich also spoke about whether or not retainers should be signed through the Information Security team or the Legal Department, what are some of the factors companies should be considering when choosing a provider, and what are common misalignment mistakes companies make when engaging Incident Response Services. Don't miss one of the most proli c Cyber Security Operations Professionals in the industry, Renana Friedlich on Ep. #143 of TF7 Radio. Listen Now Comments You must Login or Subscribe to comment. Too small! Tags: Incident Response Regulatory Risk Cyber Security Insurance Upcoming Events Enterprise Architecture Asia 07/22/2020 Online Webinar Register Now | View Agenda | Learn More Cyber Security Leaders Exchange 2020 11 - 12 August, 2020 NOW 100% ONLINE We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c. To learn more about cookies, including how to disable them, view our Cookie Policy Close
  • 2.
    RECOMMENDED Register Now |View Agenda | Learn More CISO Exchange August 2020 August 24 - 25, 2020 100% Online Register Now | View Agenda | Learn More Critical National Infrastructure 2020 September 15 - 16, 2020 Online Event Register Now | View Agenda | Learn More Cyber Security Digital Summit for Financial Services 2020 15 - 16 September, 2020 Learn More Automotive Cybersecurity Online October 06 - 07, 2020 Online Event Register Now | View Agenda | Learn More MORE EVENTS Follow Us       Subscribe to our Free Newsletter  Insights from the world’s foremost thought leaders delivered to your inbox. SUBSCRIBE Latest Webinars Security Challenges in a Remote Worker World  2020-08-26  11:00 AM - 12:00 PM EST In this roundtable discussion, experts in edge cloud architectures, cloud-based security, and remote... CISO Perspectives: Zero Trust, Secure Access, and What’s Next  2020-08-12  11:00 AM - 12:00 PM EST Workloads have moved beyond physical corporate networks & traditional perimeter defenses. Many organ... Engaging Your Line of Business for Cyber Security Initiatives  2020-08-05  10:00 AM - 11:00 AM EST Security cannot be done in a silo. 34% of cyber security professionals see unaware employees as the... MORE WEBINARS We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c. To learn more about cookies, including how to disable them, view our Cookie Policy Close
  • 3.
    Adopting a ZeroTrust Security Model [WATCH On Demand]  2020-07-15 By Seth Adler The Evolving Role Of The CISO And Rise Of Digital Risk [WATCH On Demand}  2020-07-15 By Seth Adler Defending Holman Webb with Cyber AI [WATCH On Demand]  2020-07-15 By Seth Adler Putting the ‘Sec’ into DevOps [WATCH On Demand]  2020-07-15 By Seth Adler FIND CONTENT BY TYPE News Case Studies Interviews White Papers Videos Podcasts CYBER SECURITY HUB COMMUNITY Power10 About Us Contact Us Become a Member Today Advertise with us Cookie Policy User Agreement ADVERTISE WITH US Reach Cyber Security professionals through cost-e ective marketing opportunities to deliver your message, position yourself as a thought leader, and introduce new products, techniques and strategies to the market. LEARN MORE JOIN THE CYBER SECURITY HUB COMMUNITY Join CSHUB today and interact with a vibrant network of professionals, keeping up to date with the industry by accessing our wealth of articles, videos, live conferences and more. SIGN UP TODAY! Cyber Security Hub, a division of IQPC © 2020 All rights reserved. Use of this site constitutes acceptance of our User Agreement and Privacy Policy. Careers With IQPC | Contact Us | About Us | Cookie Policy       < > We use cookies and similar technologies to recognize your visits and preferences, as well as to measure the e ectiveness of campaigns and analyze tra c. To learn more about cookies, including how to disable them, view our Cookie Policy Close