On This Page

Crisis Management: Beyond Incident Response

Peak Security | August 1-2 & 3-4


Your organization spent hundreds of thousands of dollars to deploy extensive defenses against all perceivable computer attacks and threats. However, the unthinkable has happened; your network was hacked and sensitive data was stolen from one of your critical servers. Many questions race through your mind; are more systems breached, are the hackers still in my network, how do I get rid of them, and what do I tell my bosses or worse yet our clients? Whether you are a system administrator, a chief security officer, a non-technical manager or the chief information officer, once your network is compromised, you will be tasked with new found responsibilities that are unfamiliar, challenging, lack concrete direction and generally force most people out of their comfort zone. Good management skills and decisive leadership determine the success of incident responses more so than the technical skills of employees or the promises of vendor solutions. This practical course aims to develop crisis and incident response leaders who can plan, respond and execute a successful crisis response with little or no impact to the organization. Topics are reinforced through participation in various crisis response scenarios. In order to better grasp the challenges faced by different crisis response disciplines, student scenarios cover various situations that offer experience from the perspective of technical staff, line managers and even the CIO.

Who Should Take this Course

Managers and Security Professionals interested in learning to address the "big picture" when a major crisis hits the organization.

Student Requirements

Desire to learn, participate, and share experiences.

What Students Should Bring

Preferred way to take notes.

What Students Will Be Provided With

Appropriate course materials.


Greg Miles (Ph.D., CISSP, CISA) is an experienced security consultant with over 28 years of information technology and security experience. He is a United States Air Force Veteran and has served in military and contract support for the National Security Agency, Defense Information Systems Agency, Air Force Space Command, and National Aeronautical and Space Administration supporting world-wide security efforts. Greg has planned and managed Computer Incident Response Teams (CIRT), Computer Forensics and INFOSEC training capabilities. He has worked with security for Industrial Control Systems and SCADA system. Greg has been published in multiple periodicals to include "The Security Journal" and "The International Journal on Cyber Crime." He has co-authored four (4) books and has been a technical speaker on an international basis. Greg is a network security instructor for the University of Advancing Technology (UAT) and a student thesis/dissertation advisor for UAT and Colorado Technical University

Russ Rogers (CISSP) is a recognized name in the security industry, having over 20 years experience in information security, and well over 25 years experience in information technology. He has been published in roughly 20 different books on information security, been interviewed for CNN as a subject matter expert, and published in multiple other publications (print and media). Mr. Rogers background includes experience at the National Security Agency, Defense Information Systems Agency, US Air Force, Department of Energy, Department of Interior, and other Federal and Department of Defense Agencies. Russ has been a featured speaker and trainer around the country, and in countries around the world, including Singapore, Japan, the Netherlands, and Brazil. Mr. Rogers has his Master's Degree through the University of Maryland, and is a Certified Information Systems Security Professional (CISSP). Russ is currently the Professor of Network Security for the University of Advancing Technology (uat.edu), in Tempe, AZ.