SlideShare a Scribd company logo
1 of 18
The Art of Playcalling: Building an
Incident Response Playbook
Trenton Brooks
Why Having a Playbook
is Important
The Importance to an Incident Response Playbook
▪ Helps security teams define the “Who, What and Where” of
cyberattacks.
▪ Allows teams to follow pre-planned procedures for specific
security incidents.
Incident Response Plan
vs. Playbook
Incident Response Plan vs. Incident Response Playbook
Incident Response Plan
 Tailored to consider a “first time”
reader.
 Applicable for most incidents.
 Focuses on brining resources
together.
Incident Response Playbook
 Focuses on more specific
situations.
 Provides step by step
instructions for scoped incidents.
Elements of a Playbook
Incident Response Playbook
 Preparation
▫ Initial phase where roles and teams are determined.
 Detection
▫ Define indicators that specific event is occurring.
▫ Define risk associated with the event.
 Analysis
▫ Incident is validated and potential impact is determined.
 Containment
▫ Identify assets being targeted and prevent/limit damage.
Incident Response Playbook Cont.
 Eradication
▫ Focus on eliminating the cause and addressing issues that caused the
incident.
▫ Communicate remediation activities with internal stakeholders,
management, etc.
 Recovery
▫ Bring assets back to normal operation and adjust monitoring/alerts.
▫ Communicate recovery activities with internal stakeholders,
management, etc.
 Post Incident Activity
▫ Incident is document and assess areas that need improvement.
Incident Response
Playbook Scenarios
Ransomware Playbook
Data Theft Playbook-Analysis Step
Virus Outbreak Playbook-Eradicate Step
Resources
Incident Response Playbook Templates
 https://www.incidentresponse.com/
 https://ayehu.com/cyber-security-incident-response-automation/top-5-
cyber-security-incident-response-playbooks/
Incident Response
 https://www.atlassian.com/blog/it-teams/how-to-create-an-incident-
response-playbook
 https://magoo.medium.com/incident-response-writing-a-playbook-
773e7920f171
Contact
Twitter: @TrentB55
IG: @TrentB55
Business Twitter: @VisualTorch
Business IG: @VisualTorch
YouTube: Pardon The Penetration

More Related Content

What's hot

What's hot (11)

Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...Assessing the impact of a disruption: Building an effective business impact a...
Assessing the impact of a disruption: Building an effective business impact a...
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
World-Class Incident Response Management
World-Class Incident Response ManagementWorld-Class Incident Response Management
World-Class Incident Response Management
 
Incident Management Framework
Incident Management FrameworkIncident Management Framework
Incident Management Framework
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Effective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation SlidesEffective Business Continuity Plan Powerpoint Presentation Slides
Effective Business Continuity Plan Powerpoint Presentation Slides
 
Centroid-based Text Summarization through Compositionality of Word Embeddings
Centroid-based Text Summarization through Compositionality of Word EmbeddingsCentroid-based Text Summarization through Compositionality of Word Embeddings
Centroid-based Text Summarization through Compositionality of Word Embeddings
 
CGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrainCGEIT Course Content InfosecTrain
CGEIT Course Content InfosecTrain
 
Business Continuity Planning
Business Continuity PlanningBusiness Continuity Planning
Business Continuity Planning
 
Bussiness continuity management
Bussiness continuity managementBussiness continuity management
Bussiness continuity management
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 

Similar to The Art of Playcalling: Building an Incident Response Playbook

Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docx
mattjtoni51554
 
PSY 317 .docx
PSY 317                                                      .docxPSY 317                                                      .docx
PSY 317 .docx
woodruffeloisa
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docx
SALU18
 
Incident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docxIncident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docx
jaggernaoma
 
M09_Risk Assessment ebook
M09_Risk Assessment ebookM09_Risk Assessment ebook
M09_Risk Assessment ebook
Kanchana Bishop
 

Similar to The Art of Playcalling: Building an Incident Response Playbook (20)

Writing effective scenarios quick start guide 3.0
Writing effective scenarios   quick start guide 3.0Writing effective scenarios   quick start guide 3.0
Writing effective scenarios quick start guide 3.0
 
Spring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data BreachSpring Security Briefing: Lessons Learned from Recent Data Breach
Spring Security Briefing: Lessons Learned from Recent Data Breach
 
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdfPractical Guide to Managing Incidents Using LLM's and NLP.pdf
Practical Guide to Managing Incidents Using LLM's and NLP.pdf
 
Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docx
 
PSY 317 .docx
PSY 317                                                      .docxPSY 317                                                      .docx
PSY 317 .docx
 
Lifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threatLifecycle of an advanced persistent threat
Lifecycle of an advanced persistent threat
 
ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011ISACA Belgium CERT view 2011
ISACA Belgium CERT view 2011
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Sensible defence
Sensible defenceSensible defence
Sensible defence
 
Essay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docxEssay about kindnessChoose any three consecutive days. During th.docx
Essay about kindnessChoose any three consecutive days. During th.docx
 
Incident Response Test
Incident Response TestIncident Response Test
Incident Response Test
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Incident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docxIncident Response PlanningIncident response planning includes .docx
Incident Response PlanningIncident response planning includes .docx
 
M09_Risk Assessment ebook
M09_Risk Assessment ebookM09_Risk Assessment ebook
M09_Risk Assessment ebook
 
M08_Hazard ID ebook
M08_Hazard ID ebookM08_Hazard ID ebook
M08_Hazard ID ebook
 
Severe Weather Preparedness and Resiliency
Severe Weather Preparedness and ResiliencySevere Weather Preparedness and Resiliency
Severe Weather Preparedness and Resiliency
 

Recently uploaded

“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 

Recently uploaded (20)

Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

The Art of Playcalling: Building an Incident Response Playbook

  • 1. The Art of Playcalling: Building an Incident Response Playbook Trenton Brooks
  • 2.
  • 3. Why Having a Playbook is Important
  • 4. The Importance to an Incident Response Playbook ▪ Helps security teams define the “Who, What and Where” of cyberattacks. ▪ Allows teams to follow pre-planned procedures for specific security incidents.
  • 6.
  • 7. Incident Response Plan vs. Incident Response Playbook Incident Response Plan  Tailored to consider a “first time” reader.  Applicable for most incidents.  Focuses on brining resources together. Incident Response Playbook  Focuses on more specific situations.  Provides step by step instructions for scoped incidents.
  • 8. Elements of a Playbook
  • 9.
  • 10. Incident Response Playbook  Preparation ▫ Initial phase where roles and teams are determined.  Detection ▫ Define indicators that specific event is occurring. ▫ Define risk associated with the event.  Analysis ▫ Incident is validated and potential impact is determined.  Containment ▫ Identify assets being targeted and prevent/limit damage.
  • 11. Incident Response Playbook Cont.  Eradication ▫ Focus on eliminating the cause and addressing issues that caused the incident. ▫ Communicate remediation activities with internal stakeholders, management, etc.  Recovery ▫ Bring assets back to normal operation and adjust monitoring/alerts. ▫ Communicate recovery activities with internal stakeholders, management, etc.  Post Incident Activity ▫ Incident is document and assess areas that need improvement.
  • 17. Incident Response Playbook Templates  https://www.incidentresponse.com/  https://ayehu.com/cyber-security-incident-response-automation/top-5- cyber-security-incident-response-playbooks/ Incident Response  https://www.atlassian.com/blog/it-teams/how-to-create-an-incident- response-playbook  https://magoo.medium.com/incident-response-writing-a-playbook- 773e7920f171
  • 18. Contact Twitter: @TrentB55 IG: @TrentB55 Business Twitter: @VisualTorch Business IG: @VisualTorch YouTube: Pardon The Penetration

Editor's Notes

  1. Detection-Unresponsive server, unusual network traffic