Skip to main content

Posts

Showing posts from 2017

Featured

Preparing for the Worst with an Incidence Response Plan

Every organization must have an incidence response (IR) plan that will handle preparation, identifying the start of an incident, recovering from it, restoring normal operations and support sound security policies.

With any cybersecurity incident, security teams will face uncertainties and chaotic activities. In such a high-pressure environment the risk of not following proper incidence response procedures becomes high and limiting the damage becomes elusive.  It is essential that CISOs must institute a through incidence response plan that enables clear thinking and taking pre-planned steps that will define the loss and prevent business impacts from occurring.

What makes up a sound IR plan? There are several steps when putting together an actionable IR plan, at the high-level preparation, detection, investigation, containment, eradication, recovery, and monitoring are critical fundamentals in a program.


NIST 800-61 Incidence Response Life Cycle
Getting Prepared CISOs should always pre…

Will 2018 Be a Year Addressing the Skills Gap and Cloud Security?

Things to Consider When Calculating the Return on Security Investment

Security Awareness Tips for The Holidays

Filling the Cybersecurity Skills Gap With Freelance Security Professionals

Security Awareness Training Is a Team Effort

Don’t Let Organizational Politics Derail Security Initiatives

The CISO’s Guide to Minimizing Health Care Security Risks

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

The CISO’s Guide to Managing Insider Threats

Why Machine Learning Is an Essential Tool In the CISO’s Arsenal

Hire a Team of Hackers to Identify Vulnerabilities

Is Cloud Security a Safe Bet for Highly Sensitive Government Data?

Succession Planning: The Importance of a Deputy CISO

Information Security in the Age of Disinformation

Is the CISO Job Market Overcrowded?

Building an Effective CISO-CIO Partnership

How The Next-Generation CISO Will Lead Security Strategy

CISO Complexity: A Role More Daunting Than Ever