SlideShare a Scribd company logo
1 of 20
Download to read offline
Total Endpoint Protection: #1 in EDR & Next-Gen AV
The Incident Response Success Checklist
Nine Critical Steps
Your Current Plan Lacks
Total Endpoint Protection: #1 in EDR & Next-Gen AV
9 overlooked steps to incorporate into your IR plan…
1. ✓ PREPARATION ACROSS THE ENTIRE COMPANY
2. ✓ IDENTIFY MEASUREMENTS AND MATRICES
3. ✓ HOLD TEST RUNS
4. ✓ CHECK THE ALERTS THAT APPEAR BENIGN
5. ✓ CREATE A CONSOLIDATED DATA REPOSITORY
6. ✓ MONITOR INDUSTRIAL CONTROLS
7. ✓ CONTAINMENT AND REMEDIATION
8. ✓ PLAN FOR A FOLLOW-UP BUDGET AND RESOURCES
9. ✓ FOLLOW-UP ACROSS THE ORGANIZATION
Total Endpoint Protection: #1 in EDR & Next-Gen AV
1. PREPARATION ACROSS THE ENTIRE COMPANY
Involve key people from every department.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Involve people from all teams
o A bank handling the impact of a breach may need
help from its public relations staff if the
organization is legally required to publicly
disclose the incident.
o The bank’s Web development team may also need to
be involved if the adversaries carried out their
attack by exploiting a vulnerability in the
company’s website, like a WordPress flaw.
o The company’s human resources department may need
to be contacted if employees’ personal information
was disclosed.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
2. IDENTIFY MEASUREMENTS AND MATRICES
Define the key performance indicators (KPIs) that
the security team will measure during the event.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Some good time-related measurements to track
o Time to detection
o Time to report an incident
o Time to triage
o Time to investigate
o Time to response
o The number of false positives
o The nature of the attack (malware vs. non-malware
based) and the tool that spotted the incident
Total Endpoint Protection: #1 in EDR & Next-Gen AV
3. HOLD TEST RUNS
Use the preparation phase to consider the various
breach scenarios that could play out.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
This is only a test.
o Various breach scenarios should be reviewed in
activities like team training, tabletop exercises
and blue team-red team exercises.
o Simulate an actual breach, so employees know their
roles
o Identify weak points and risk factors, figure out
what activities need to be closely monitored and
decide how to spend their security budgets.
o An IR plan should be revised yearly or more
frequently if the company grows rapidly.
o Additionally, the incident response plan should
incorporate any business regulations.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
4. CHECK THE ALERTS THAT APPEAR BENIGN
Threat detection can originate from situations
that appear benign and not related to security.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Always investigate.
1. Check for signs of compromise when
looking into a tech issue, even if the
incident doesn’t seem to be connected to
security.
2. Investigate a hunch, since a person’s
intuition can provide a lead that results
in a breach being detected.
The best defense is well-trained users
Total Endpoint Protection: #1 in EDR & Next-Gen AV
5. CREATE A CONSOLIDATED DATA REPOSITORY
Consolidate all incidents into a central
repository.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Get a comprehensive view.
o Incident response teams will often try to build a
view of everything that was going on in the
environment in hindsight.
o At this point, it is often too late to construct a
comprehensive view and what the incident response
team ends up with is too partial to be of any
value.
o Building and maintaining a data repository that
has continuous and a broad visibility across the
full environment is not just essential for
regulatory requirements. It is crucial for
accelerating investigation and response.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
6. DON’T OVERLOOK INDUSTRIAL CONTROLS
Attackers will target industrial control system
infrastructure.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Be paranoid with industrial controls.
o Many organizations have facilities that run
industrial systems, such as an oil refinery
or a factory that manufactures drugs.
However, companies may not think attackers
will target these locations and not closely
monitor them for malicious activity.
o In other cases, a department other than IT or
security manages the industrial control
system infrastructure. The personnel in this
department may lack the knowledge needed to
closely monitor these systems, potentially
leading to security being neglected.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
7. CONTAINMENT AND REMEDIATION
Stop the entire attack campaign, not just a
symptom of the attack.
SUBSCRIBE TO OUR BLOG
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Don’t leave room for the same attack to re-occur
o The containment and remediation
plan must be based on the
findings of the security team’s
investigation of the incident.
o Often times, the plan that’s
developed relies on information
only gathered during the
preliminary detection
Total Endpoint Protection: #1 in EDR & Next-Gen AV
8. PLAN FOR A FOLLOW-UP BUDGET AND RESOURCES
Follow-up is critical to preventing a security
incident from reoccurring.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Some follow up steps could include…
o Add new detection rules to a SIEM, or hire
additional security analysts, purchase
technology to detect attacks.
o Reviews KPI performance and determine if they
need to be adjusted
o Improve your set of detection rules, or
upgrade to a different detection system with
better capabilities.
o Or add a detection rule based on an incident
that was reported by a user instead of being
detected by the SIEM.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
9. FOLLOW-UP ACROSS THE ORGANIZATION
Incident response requires the cooperation of an
entire organization, not just the IT and security
departments.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Join our community
SUBSCRIBE TO THE BLOG

More Related Content

What's hot

Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation ApproachesPriyanka Aash
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class TenFRSecure
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6FRSecure
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardHITCON GIRLS
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing ExplainedRand W. Hirt
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013beltface
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017FRSecure
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class NineFRSecure
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8FRSecure
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session TwoFRSecure
 
Baking Safety into Infrastructure Testing
Baking Safety into Infrastructure TestingBaking Safety into Infrastructure Testing
Baking Safety into Infrastructure TestingJessica DeVita
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotShah Sheikh
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017FRSecure
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefShah Sheikh
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark ShermanRinaldi Rampen
 

What's hot (20)

Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Deception Technology: Use Cases & Implementation Approaches
 Deception Technology: Use Cases & Implementation Approaches Deception Technology: Use Cases & Implementation Approaches
Deception Technology: Use Cases & Implementation Approaches
 
Purple team is awesome
Purple team is awesomePurple team is awesome
Purple team is awesome
 
FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10FRSecure 2018 CISSP Mentor Program Session 10
FRSecure 2018 CISSP Mentor Program Session 10
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten2019 FRSecure CISSP Mentor Program: Class Ten
2019 FRSecure CISSP Mentor Program: Class Ten
 
2018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 62018 CISSP Mentor Program- Session 6
2018 CISSP Mentor Program- Session 6
 
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - HowardBirds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
 
Pen Testing Explained
Pen Testing ExplainedPen Testing Explained
Pen Testing Explained
 
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
 
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
 
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRSecure CISSP Mentor Program: Class Nine
 
2018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 82018 FRSecure CISSP Mentor Program Session 8
2018 FRSecure CISSP Mentor Program Session 8
 
2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two2019 FRecure CISSP Mentor Program: Session Two
2019 FRecure CISSP Mentor Program: Session Two
 
Baking Safety into Infrastructure Testing
Baking Safety into Infrastructure TestingBaking Safety into Infrastructure Testing
Baking Safety into Infrastructure Testing
 
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized HoneypotDefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
DefCamp - Mohamed Bedewi - Building a Weaponized Honeypot
 
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
 
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman ThiefYehia Mamdouh @ DTS Solution - The Gentleman Thief
Yehia Mamdouh @ DTS Solution - The Gentleman Thief
 
What is pentest
What is pentestWhat is pentest
What is pentest
 
"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman"CERT Secure Coding Standards" by Dr. Mark Sherman
"CERT Secure Coding Standards" by Dr. Mark Sherman
 

Similar to The Incident Response Checklist - 9 Steps Your Current Plan Lacks

325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-SessionRyan Faircloth
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesRyan Faircloth
 
safety-instrumented-systems-summers.ppt
safety-instrumented-systems-summers.pptsafety-instrumented-systems-summers.ppt
safety-instrumented-systems-summers.ppteditorschoice1
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementAmr El-Ganainy
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Om 0015 maintenance management
Om 0015   maintenance managementOm 0015   maintenance management
Om 0015 maintenance managementsmumbahelp
 
ITD BSides PDX Slides
ITD BSides PDX SlidesITD BSides PDX Slides
ITD BSides PDX SlidesEricGoldstrom
 
66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docxblondellchancy
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksIvanti
 
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docxBest Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docxtangyechloe
 
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Cairn India Limited
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Education & Training Boards
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoMark John Lado, MIT
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecCheapSSLsecurity
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyRapidSSLOnline.com
 
The Antidote to Implementation Failure in the World of Asset Management
The Antidote to Implementation Failure in the World of Asset ManagementThe Antidote to Implementation Failure in the World of Asset Management
The Antidote to Implementation Failure in the World of Asset ManagementNancy Regan
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers Ahmed Gamal
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 

Similar to The Incident Response Checklist - 9 Steps Your Current Plan Lacks (20)

325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session325838924-Splunk-Use-Case-Framework-Introduction-Session
325838924-Splunk-Use-Case-Framework-Introduction-Session
 
A Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use CasesA Framework for Developing and Operationalizing Security Use Cases
A Framework for Developing and Operationalizing Security Use Cases
 
Fmea
FmeaFmea
Fmea
 
safety-instrumented-systems-summers.ppt
safety-instrumented-systems-summers.pptsafety-instrumented-systems-summers.ppt
safety-instrumented-systems-summers.ppt
 
Knowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & ManagementKnowledge Based System (Expert System) : Equipment Safety Control & Management
Knowledge Based System (Expert System) : Equipment Safety Control & Management
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Om 0015 maintenance management
Om 0015   maintenance managementOm 0015   maintenance management
Om 0015 maintenance management
 
ITD BSides PDX Slides
ITD BSides PDX SlidesITD BSides PDX Slides
ITD BSides PDX Slides
 
66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx66Chapter 3Security Surveys and the AuditLawrence .docx
66Chapter 3Security Surveys and the AuditLawrence .docx
 
Protect Against 85% of Cyberattacks
Protect Against 85% of CyberattacksProtect Against 85% of Cyberattacks
Protect Against 85% of Cyberattacks
 
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docxBest Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx
Best Coding PracticesLaDonne White, Manager, Webtrain Inc. e.docx
 
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...Critical Review of  PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
Critical Review of PSM In Petroleum Industry | Mr. Hirak Dutta, Executive Di...
 
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
Denis Hackett M.Sc. - IDC Presentation Sept 2014 Croke Park Sept25 - Denis Ha...
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
The Antidote to Implementation Failure in the World of Asset Management
The Antidote to Implementation Failure in the World of Asset ManagementThe Antidote to Implementation Failure in the World of Asset Management
The Antidote to Implementation Failure in the World of Asset Management
 
Safety instrumented systems angela summers
Safety instrumented systems angela summers Safety instrumented systems angela summers
Safety instrumented systems angela summers
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 

More from Cybereason

Antifragile Cyber Defense
Antifragile Cyber DefenseAntifragile Cyber Defense
Antifragile Cyber DefenseCybereason
 
An Introduction to the Agile SoC
An Introduction to the Agile SoCAn Introduction to the Agile SoC
An Introduction to the Agile SoCCybereason
 
Protecting the financial services industry
Protecting the financial services industryProtecting the financial services industry
Protecting the financial services industryCybereason
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsCybereason
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareCybereason
 
Some PowerShell Goodies
Some PowerShell GoodiesSome PowerShell Goodies
Some PowerShell GoodiesCybereason
 
Ransomware is Coming to a Desktop Near You
Ransomware is Coming to a Desktop Near YouRansomware is Coming to a Desktop Near You
Ransomware is Coming to a Desktop Near YouCybereason
 

More from Cybereason (8)

Antifragile Cyber Defense
Antifragile Cyber DefenseAntifragile Cyber Defense
Antifragile Cyber Defense
 
An Introduction to the Agile SoC
An Introduction to the Agile SoCAn Introduction to the Agile SoC
An Introduction to the Agile SoC
 
Protecting the financial services industry
Protecting the financial services industryProtecting the financial services industry
Protecting the financial services industry
 
Threat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the BasicsThreat Hunting 102: Beyond the Basics
Threat Hunting 102: Beyond the Basics
 
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance HealthcareAvoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
 
Some PowerShell Goodies
Some PowerShell GoodiesSome PowerShell Goodies
Some PowerShell Goodies
 
Ransomware is Coming to a Desktop Near You
Ransomware is Coming to a Desktop Near YouRansomware is Coming to a Desktop Near You
Ransomware is Coming to a Desktop Near You
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

The Incident Response Checklist - 9 Steps Your Current Plan Lacks

  • 1. Total Endpoint Protection: #1 in EDR & Next-Gen AV The Incident Response Success Checklist Nine Critical Steps Your Current Plan Lacks
  • 2. Total Endpoint Protection: #1 in EDR & Next-Gen AV 9 overlooked steps to incorporate into your IR plan… 1. ✓ PREPARATION ACROSS THE ENTIRE COMPANY 2. ✓ IDENTIFY MEASUREMENTS AND MATRICES 3. ✓ HOLD TEST RUNS 4. ✓ CHECK THE ALERTS THAT APPEAR BENIGN 5. ✓ CREATE A CONSOLIDATED DATA REPOSITORY 6. ✓ MONITOR INDUSTRIAL CONTROLS 7. ✓ CONTAINMENT AND REMEDIATION 8. ✓ PLAN FOR A FOLLOW-UP BUDGET AND RESOURCES 9. ✓ FOLLOW-UP ACROSS THE ORGANIZATION
  • 3. Total Endpoint Protection: #1 in EDR & Next-Gen AV 1. PREPARATION ACROSS THE ENTIRE COMPANY Involve key people from every department.
  • 4. Total Endpoint Protection: #1 in EDR & Next-Gen AV Involve people from all teams o A bank handling the impact of a breach may need help from its public relations staff if the organization is legally required to publicly disclose the incident. o The bank’s Web development team may also need to be involved if the adversaries carried out their attack by exploiting a vulnerability in the company’s website, like a WordPress flaw. o The company’s human resources department may need to be contacted if employees’ personal information was disclosed.
  • 5. Total Endpoint Protection: #1 in EDR & Next-Gen AV 2. IDENTIFY MEASUREMENTS AND MATRICES Define the key performance indicators (KPIs) that the security team will measure during the event.
  • 6. Total Endpoint Protection: #1 in EDR & Next-Gen AV Some good time-related measurements to track o Time to detection o Time to report an incident o Time to triage o Time to investigate o Time to response o The number of false positives o The nature of the attack (malware vs. non-malware based) and the tool that spotted the incident
  • 7. Total Endpoint Protection: #1 in EDR & Next-Gen AV 3. HOLD TEST RUNS Use the preparation phase to consider the various breach scenarios that could play out.
  • 8. Total Endpoint Protection: #1 in EDR & Next-Gen AV This is only a test. o Various breach scenarios should be reviewed in activities like team training, tabletop exercises and blue team-red team exercises. o Simulate an actual breach, so employees know their roles o Identify weak points and risk factors, figure out what activities need to be closely monitored and decide how to spend their security budgets. o An IR plan should be revised yearly or more frequently if the company grows rapidly. o Additionally, the incident response plan should incorporate any business regulations.
  • 9. Total Endpoint Protection: #1 in EDR & Next-Gen AV 4. CHECK THE ALERTS THAT APPEAR BENIGN Threat detection can originate from situations that appear benign and not related to security.
  • 10. Total Endpoint Protection: #1 in EDR & Next-Gen AV Always investigate. 1. Check for signs of compromise when looking into a tech issue, even if the incident doesn’t seem to be connected to security. 2. Investigate a hunch, since a person’s intuition can provide a lead that results in a breach being detected. The best defense is well-trained users
  • 11. Total Endpoint Protection: #1 in EDR & Next-Gen AV 5. CREATE A CONSOLIDATED DATA REPOSITORY Consolidate all incidents into a central repository.
  • 12. Total Endpoint Protection: #1 in EDR & Next-Gen AV Get a comprehensive view. o Incident response teams will often try to build a view of everything that was going on in the environment in hindsight. o At this point, it is often too late to construct a comprehensive view and what the incident response team ends up with is too partial to be of any value. o Building and maintaining a data repository that has continuous and a broad visibility across the full environment is not just essential for regulatory requirements. It is crucial for accelerating investigation and response.
  • 13. Total Endpoint Protection: #1 in EDR & Next-Gen AV 6. DON’T OVERLOOK INDUSTRIAL CONTROLS Attackers will target industrial control system infrastructure.
  • 14. Total Endpoint Protection: #1 in EDR & Next-Gen AV Be paranoid with industrial controls. o Many organizations have facilities that run industrial systems, such as an oil refinery or a factory that manufactures drugs. However, companies may not think attackers will target these locations and not closely monitor them for malicious activity. o In other cases, a department other than IT or security manages the industrial control system infrastructure. The personnel in this department may lack the knowledge needed to closely monitor these systems, potentially leading to security being neglected.
  • 15. Total Endpoint Protection: #1 in EDR & Next-Gen AV 7. CONTAINMENT AND REMEDIATION Stop the entire attack campaign, not just a symptom of the attack. SUBSCRIBE TO OUR BLOG
  • 16. Total Endpoint Protection: #1 in EDR & Next-Gen AV Don’t leave room for the same attack to re-occur o The containment and remediation plan must be based on the findings of the security team’s investigation of the incident. o Often times, the plan that’s developed relies on information only gathered during the preliminary detection
  • 17. Total Endpoint Protection: #1 in EDR & Next-Gen AV 8. PLAN FOR A FOLLOW-UP BUDGET AND RESOURCES Follow-up is critical to preventing a security incident from reoccurring.
  • 18. Total Endpoint Protection: #1 in EDR & Next-Gen AV Some follow up steps could include… o Add new detection rules to a SIEM, or hire additional security analysts, purchase technology to detect attacks. o Reviews KPI performance and determine if they need to be adjusted o Improve your set of detection rules, or upgrade to a different detection system with better capabilities. o Or add a detection rule based on an incident that was reported by a user instead of being detected by the SIEM.
  • 19. Total Endpoint Protection: #1 in EDR & Next-Gen AV 9. FOLLOW-UP ACROSS THE ORGANIZATION Incident response requires the cooperation of an entire organization, not just the IT and security departments.
  • 20. Total Endpoint Protection: #1 in EDR & Next-Gen AV Join our community SUBSCRIBE TO THE BLOG