Webinar: Reconstruction of a Security Breach

Adam Bridge will take the audience through how a cyber incident might happen in the real world and the initial tasks required when a security incident is detected. 

Jul 19 2018
19 Jul 2018   16:00 - 16:45
Online Show Map

Please note: You can view the recording by simply clicking 'Register to Attend' and filling in the contact form. 

The need for well-planned, well-executed incident response is greater than ever before as security incidents are inevitable for organisations. Preparedness is key to a healthy security posture, Adam Bridge, Head of Response at Context, takes the audience through how an incident might happen in the real world and the initial tasks and considerations when a security incident is detected that organisations will need to undertake.

This webinar will allow you to:

  • See how a cyber-incident unfolds in the real world;
  • Gain an understanding of what you should expect when an incident occurs;
  • Understand how prepared your organisation is for a cyber-incident breach. 

This webinar benefits:

CISOs, Testing managers, IT managers, Security Analysts and Audit & Risk Managers looking to improve your organisation's security posture. 


In his role as Head of Response at Context, Adam is responsible for ensuring the Context Response team delivers on helping clients to discover the full impact of a breach and carry out a thorough and effective remediation whilst advising on effective monitoring capabilities to detect and respond to sophisticated cyber-attacks in the future. 

Adam first joined Context in December 2014 as a Lead Intrusion Analyst within the Response department, to carry out analysis of network traffic and digital media to identify malicious or suspicious activity. He applies his incident response and incident management experience to deliver an intelligence-led, co-ordinated and comprehensive customer engagement. Academically, Adam has a Master’s Degree in Forensic Computing and is now working in his own time, towards his PhD in Computing, focusing on memory forensics.

Register to attend

To register your interest, click here and complete the form.

CHECK IT Health Check Service
Cyber Essentials
CESG Certified Service
First - Improving Security Together
BSI ISO 9001 FS 581360
BSI ISO 27001 IS 553326
PCI - Approved Scanning Vendor
NCSC CCSC - Assured Service Provider
ASSURE Cyber Supplier - CAA