<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>Cyber Day: Cybersecurity for Directors and C-Level Executives</provider_name><provider_url>https://conferences.law.stanford.edu/cyberday</provider_url><author_name>jcarian</author_name><author_url>https://conferences.law.stanford.edu/cyberday/author/jcarian/</author_url><title>The Incident Response Plan - Cyber Day: Cybersecurity for Directors and C-Level Executives</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="XL0gqXHmb6"&gt;&lt;a href="https://conferences.law.stanford.edu/cyberday/sessions/the-incident-response-plan/"&gt;The Incident Response Plan&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://conferences.law.stanford.edu/cyberday/sessions/the-incident-response-plan/embed/#?secret=XL0gqXHmb6" width="600" height="338" title="&#x201C;The Incident Response Plan&#x201D; &#x2014; Cyber Day: Cybersecurity for Directors and C-Level Executives" data-secret="XL0gqXHmb6" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://conferences.law.stanford.edu/cyberday/wp-includes/js/wp-embed.min.js
/* ]]&gt; */
&lt;/script&gt;
</html><description>Experts often emphasize the value of an appropriately structured incident response plan, and frequently raise questions about appropriate reporting structures within IT organizations. This session reviews the elements of incident response plans, and explores the debate about reporting relationships.</description></oembed>
