IBM Resilient Latest

IBM Resilient Latest Courses:

NEW

In this course, you learn how to use the Resilient platform to track time that is spent on incident field values and you see examples of graphing incidents over time.

The tutorial shows you how to configure the Resilient platform to track time changes to incident field values.

You can configure the Resilient platform to track time for incident fields for select and boolean field types, for both custom and default fields. This enables you to track the time you take to perform various tasks, activities, and processes when you respond to an incident.


Agenda

  • Tracking time spent on incident field values
  • Creating custom graphs in the Resilient application
  • Tutorial: Time tracking incident field states
    • Step 1: Edit Incident field
    • Step 2: Tracking a custom field
    • Step 3: Adding time tracking data to a custom tab
    • Step 4: Creating a time tracking custom graph

NEW

In the fourth and final session of the Resilient Developer's Corner series, learn how to publish your integration to the App Exchange. This talk will walk through the steps to complete your integration and submit it for publication on the App Exchange. It will include how to follow the validation process and what steps to take to ensure successful validation.

Join Mark Scherfling, Resilient Engineering Manager, for this technical webinar and an in-depth look at the inner-workings of the Resilient SOAR Platform and integrations.

Agenda

  • Introduction
  • Why publish?
  • Requirements checklist
  • Files to change
  • Additional tools
  • Submission prep
  • Submission demonstration
  • Validation process
  • References


Duration: 26 minutes


NEW

The Federal Trade Commission (FTC) is the primary federal data security regulator in the US. The FTC has brought numerous data security enforcement actions under Section 5 of the FTC Act for unfair or deceptive trade practices.

The FTC typically enters into consent decree with violating organizations, rather than litigating data breach cases. The FTC may seek redress in the form of civil penalties in some data breach enforcement actions. When recovering a civil penalty, the FTC must file suit in federal court. Generally, the FTC will negotiate the terms of a stipulated judgment with the violating organization prior to filing suit and then concurrently files its civil complaint and stipulated judgment. In recent Consent Decrees, the FTC has negotiated language requiring the violating organization to report any notifiable data breaches and submit compliance reports with specific criteria to the FTC.

In this course, you will learn how to use Resilient’s customization features to develop a framework to comply with the data breach notification requirements of an FTC consent decree.

Agenda

  • Federal Trade Commission (FTC): An Overview
  • FTC Enforcement Actions
  • Obligations to Report Covered Incidents to the FTC
  • Using Resilient