Training

Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Perspective from Inside a Major Retail Breach: Do Mega Breaches Matter? (Hint ... They Do.)

Perspective from Inside a Major Retail Breach: Do Mega Breaches Matter? (Hint ... They Do.)

Bryce Austin is a certified chief information security manager who weathered the storm as a senior group manager at Target during the retailer's November 2013 breach - a breach that resulted in the exposure of 40 million payment cards and personally identifiable information linked to an additional 70 million customers. Ultimately, the compromise of a third-party vendor was to blame for the initial breach, as was the case in many other recent cybersecurity incidents. But Target was not let off the hook. The Target breach went on to set a new standard for how the C-suite, the United States Congress and the public respond to breaches. In this session, Austin, who in his spare time doubles as a car-racing enthusiast and driver, will draw parallels between automobile racing and today's data breaches, noting how both can quickly turn from "smooth sailing" to "out of control" in the blink of an eye. What could have been done beforehand to prevent these retail breaches from ever taking place? Here, Austin will review how budgetary constraints can make the necessary focus on technology security elusive, while the user experience is often in opposition to security "best practices."

See Also: OnDemand | Realities of Choosing a Response Provider

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

Slide Previews

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.