What Happens After the Breach?
Incident Response Edge
September 17, 2025, at 1:00 pm EST
A breach has happened. Now what?
A cybersecurity breach can cripple an SMB in minutes, and one of their first calls is always to YOU, their MSP. The way you respond in those critical first hours defines your client relationship, your reputation, and your growth potential.
In this CyberTalks session, we’ll talk about what really happens after a breach and how MSPs can build a reliable, repeatable incident response playbook. You’ll learn how to combine Zero Trust Network Access (ZTNA) with practical containment strategies to protect clients faster, minimize downtime, and strengthen trust.
You’ll walk away with:
A proven incident response framework for MSPs
Step-by-step guidance on isolating compromised devices, restoring services, and reducing business impact.
How ZTNA reduces the breach blast radius
Control lateral movement, enforce least-privilege access, and protect cloud and hybrid environments, even when traditional VPNs and firewalls fail.
Turning breach response into business growth
How top MSPs leverage post-incident moments to show value, win client trust, and expand security services.
Meet the Speakers

Jim Smith
CEO
ProperSky

David Nankervis
CRO
Timus Networks

Duygu Erden
Sr. Channel Growth Manager
Timus Networks