LATEST NEWS

DataBank Announces ~$2 Billion Equity Raise. Read the press release.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

Get a Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of team members will be in touch shortly.

Schedule a Tour

Tour Our Facilities

Let us know which data center you'd like to visit and how to reach you, and one of team members will be in touch shortly.

CISO Corner Episode 18 Topic: How to respond to an cyber attack
CISO Corner Episode 18 Topic: How to respond to an cyber attack

CISO Corner Episode 18 Topic: How to respond to an cyber attack

  • Updated on April 15, 2023
  • /
  • 2 min read
HIPAA FISMA PCI ISO GDPR

Featuring:  Mark Houpt, DataBank’s Chief Information Security Officer

Listen to Mark Houpt as he discusses appropriate responses to an attack.

Mark Houpt discusses crucial aspects of responding to an attack, providing insights on determining appropriate responses, resource limitations, and incident response plans. He covers:

1. Determining Appropriate Response: Understanding how to assess an attack and decide on the most suitable response strategy. This involves considering various factors such as the nature and severity of the attack, potential impact, and available resources.

2. Resource Constraints: Exploring scenarios where the required response exceeds available resources. This could involve strategies for optimizing existing resources, seeking external assistance, or prioritizing actions to contain and mitigate the attack effectively.

3. Incident Response Plans: Highlighting the significance of having comprehensive incident response plans in place. These plans typically outline specific steps and protocols to follow when facing security incidents, ensuring a structured and coordinated approach to address the situation promptly and effectively.

Run Time: 10 minutes

DataBank’s CISO Corner is for CISOs and security practitioners, where we discuss a variety of cybersecurity topics and current events from the CISO’s perspective. Our broadcast is designed for those who want to hear from security and compliance experts on the front lines.

Get Started

Get Started

Discover the DataBank Difference today:
Hybrid infrastructure solutions with boundless edge reach and a human touch.

Get A Quote

Request a Quote

Tell us about your infrastructure requirements and how to reach you, and one of the team members will be in touch.

Schedule a Tour

Tour Our Facilities

Let us know which data center you’d like to visit and how to reach you, and one of the team members will be in touch shortly.