Skip to content

Cyber Incident Response Expert Guide: A critical component of enterprise security planning  

While beneficial, digital transformation has opened the door to various modern cyber threats. These threats are becoming increasingly sophisticated, persistent, and difficult to detect, posing risks to organizations of all sizes and industries. In this guide, we will explore cyber incident response, its importance, and strategies organizations can implement. 

Download this free guide, and you will discover how to:

  • Reports that show how modern cyber threats are advancing and becoming increasingly harmful to enterprises
  • Key components of an effective cyber incident response plan
  • Building a robust cyber incident response plan  
  • 6clicks’ cyber incident response solution


Louis Strauss

Chief Product Officer & Co-Founder, 6clicks

Louis began his career in Berlin where he also founded Dobbel Berlin – Berlin’s curated search engine.

Returning to Melbourne to join KPMG, Louis lead the development of software designed to distribute IP and create a platform for us by advisors and clients. While at KPMG, Louis also co-authored Chasing Digital: A Playbook for the New Economy.

Louis is accomplished in stakeholder management, requirements gathering, product testing, refinement and project implementation. Louis also holds a Bachelor of Engineering and a Masters of Information Systems from the University of Melbourne.

Dr. Heather Buker

Chief Customer Officer, 6clicks

Heather has been a technical SME in cybersecurity her entire career, from developing cybersecurity software to consulting, service delivery, architecting, and product management across most industry verticals.

An engineer by trade, Heather specializes in translating business needs and facilitating solutions to complex cyber and GRC use cases with technology.

Heather has a Bachelors in Computer Engineering, Masters in Engineering Management, and a Doctorate in Information Technology with a specialization in information assurance and cybersecurity.