IBM Security Join our 16,000+ members as we work together to overcome the toughest challenges of cybersecurity. Join the Community
From SolarWinds to REvil to DarkSide and others, the past couple years have taught us it’s not if a cyberattack will happen but when. Responding to and recovering quickly from incidents like ransomware, phishing attacks, insider threats, and malware requires a remediation approach with a pre-developed plan and process. But this is only half the battle to reducing attacker impact and preserving your organization’s reputation. To reduce the risk of future incidents and prepare for a worst-case scenario, proper preparation, training and exercising your response plan is critical so your business functions can react with speed and unison during an attack.
Join IBM Security X-Force incident responders as they walk you through lessons learned from these recent attacks and learn the top findings from IDC’s new MarketScape for Worldwide Incident Readiness Services Report to see the criteria other organizations are using to evaluate IR to achieve effective cyber resilience.
Michael (Mike) Barcomb serves as the Global Cyber Crisis Management Leader for the IBM Security business unit. In this role, he is responsible for coordinating incident response for pandemic level cybersecurity attacks affecting multiple IBM Security customers across geographies and/or industries. His career in information security began in 1987 while serving in the United States Army as a Military Intelligence Officer and culminated with 30 years of service with the United States Army Reserves in May 2017. Michael has also been employed with IBM since 1991 working in various software development and operational roles. Michael holds a B.S. degree in Computer Information Systems, an MBA, a Masters of Strategic Studies and Masters certificate in Cybersecurity.
John Dwyer is the X-Force Incident Response Threat Assessment Global Lead. Prior to joining X-Force, John was a member of the technical staff of a federally funded research and development center conducting research for the U.S. Army and U.S Air Force on ways to improve defensive cyber operations and incident response. John has a wide array of cybersecurity and engineering experience thanks to a 10-year career working in various roles for government, academic, and private institutions. John holds MCP, GCIH, andGCIA certifications, as well as, a Master’s degree in Information Security from Carnegie Mellon University and Bachelor’s degrees in Computer Science and Mathematics from Bethany College.