SlideShare a Scribd company logo
1 of 32
2 
Introductions: Today’s Speakers 
• Ted Julian, Chief Marketing Officer, Co3 Systems 
• Richard White, MBA CISP CHP/CHSS, Solutions 
Principal, HP Security Intelligence and Operational 
Consulting
3 
Agenda 
• The Four Pillars of an Incident Response function: 
– Pillar 1: Identifying Critical Assets and Risks 
– Pillar 2: Scope the potential impact to the organization 
– Pillar 3: Understand your capabilities 
– Pillar 4: Know your threats and prepare 
• Questions
4 
About Co3’s Incident Response Management 
System 
MITIGATE 
Document Results & 
Improve Performance 
• Generate reports for management, 
auditors, and authorities 
• Conduct post-mortem 
• Update SOPs 
• Track evidence 
• Evaluate historical performance 
• Educate the organization 
ASSESS 
Identify and Evaluate Incidents 
• Assign appropriate team members 
• Evaluate precursors and indicators 
• Correlate threat intelligence 
• Track incidents, maintain logbook 
• Prioritize activities based on criticality 
• Generate assessment summaries 
PREPARE 
Improve Organizational Readiness 
• Appoint team members 
• Fine-tune response SOPs 
• Escalate from existing systems 
• Run simulations (firedrills / table tops) 
MANAGE 
Contain, Eradicate, and 
Recover 
• Generate real-time IR plan 
• Coordinate team response 
• Choose appropriate containment strategy 
• Isolate and remediate cause 
• Instruct evidence gathering and handling 
• Log evidence
5 
Security Intelligence & Operations Consulting 
ESP 
Services 
Founded: 2007 
Experience: 
• 30+ SOC Builds 
• 90+ SOC Assessments 
• 30+ SIOC Consultants worldwide 
Solution Approach: 
• People, Process, & Technology 
Accelerated Success: 
• Mature Project Methodology 
• Best Practices 
• Extensive Intellectual Capital 
Purpose: 
Ensure our customers are successful with ESP 
products by providing the right People, building the 
right Processes and delivering effective Technology.
6 
HP’s industry-leading scale 
10 out of 10 
Top telecoms 
HP Security Professionals 5000+ 
2.3billion 
Monthly security events 
47m 
HP Secured User Accounts 
9 out 
of 10 
Major 
banks 
All major branches 
US Department of Defense 
9 out of 10 
Top software companies 
8 
Global Security 
Operations Centers 
Global SOC 
Planned regional SOC 
900+ 
HP managed security customers
PILLAR 1
8 
Pillar 1: Identifying Critical Assets and Risks 
Create an Asset and Threat Inventory 
• Asset Inventory – what are you trying to 
protect (people, processes, physical, 
data) 
• Threat Inventory – what are the threats 
(Cyber, Weather, Infrastructure, etc…) 
Asset Description Owner Category BU Date Vendor Qty Value Model No. Serial No. 
Marketing 
database 
Marketing database, 
customer list 
Bob ratchet Data ME Dept. 4/17/14 Oracle 1 $ 25,000 
Web Server 
Linuc Serv er, apache 
web server; 
Debbie 
Thompson 
Hardware/Soft 
ware/Data 
Operations 9/3/14 Multiple 4 $1,200,000 
$ - 
Name Host Name IP Address MAC Address Static Addressing Category URI 
WMServer1 WMServer1 10.100.4.128 00:AE:FE:01:08 10.100.4.128 /All Asset Categories/Prod 
WMServer2 WMServer2 10.100.4.130 01:AF:CB:02:09 10.100.4.130 /All Asset Categories/Prod 
WMServer3 WMServer3 10.100.4.127 00:AE:FE:01:08 10.100.4.127 /All Asset Categories/Prod 
WMServer4 WMServer4 10.100.4.125 01:AF:CB:02:11 10.100.4.125 /All Asset Categories/Prod 
WMServer10 WMServer10 10.100.4.121 00:AE:FE:01:00 10.100.4.121 /All Asset Categories/Prod 
DBServer3 DBServer3 10.101.4.99 01:AF:CB:02:21 10.101.4.99 /All Asset Categories/Prod
9 
Pillar 1: Identifying Critical Assets and Risks 
• Identify the assets at a high level and work down 
– What is critical? 
– What is its value if lost? 
• Replacement cost, additional staffing, resource expenses, manual 
processing costs. 
• Lost revenue. 
– What are the dependencies and interdependencies. 
• Impact to people? 
• How will processes will be affected in other areas
10 
Pillar 1: Identifying Critical Assets and Risks 
• Get the business partners involved in the data collection 
process 
– What is mission critical? 
– Where is critical or sensitive information stored or processed? 
– What locations are mission critical or high value? 
– Assess the impact on the organizations critical functions, operations, and 
customer. 
• Collect the information: 
Questionnaires/Interviews/workshops
11 
Pillar 1: Identifying Critical Assets and Risks 
Threat 
• Fire 
• Flood 
• Cyber Attacks 
• Insider Fraud 
• Failed Backup 
• HVAC Failure 
• Hurricane 
• Terrorism 
• Data Theft 
• PII Disclosure 
• Power Failure 
• Phishing Attack 
• Loss of Key Staff 
• Virus Outbreak 
• Pandemic 
• Lawsuits
12 
Risk Distribution 
Threat No. 
Fire R01 
Flood R02 
Cyber Attacks R03 
Insider Fraud R04 
Failed Backup R05 
Virus Outbreak R06 
HVAC Failure R07 
Data Theft R08 
PII Disclosure R09 
Power Failure R10 
Phishing Attack R11 
Loss of Key Staff R12 
10 50 100 
Low-High 
R0 
6 
Medium- 
High 
High 
05 25 
R0 
4 
Low-Medium Medium 
High- 
Medium 
R0 
1 
R0 
8 
01 05 
R0 
3 
R0 
2 
Low Medium-Low High-Low 
R1 
2 
R1 
1 
R0 
9 
R1 
0 
R0 
7 
R0 
5 
50 
10
POLL
PILLAR 2
15 
Pillar 2: Scope the Potential Impact to the 
Organization 
Priority 
Asset/Business 
Process 
Recovery Time 
Objective (RTO) 
Maximum 
Tolerable 
Downtime (MTD) 
Recovery Point 
Objective (RPO) 
1 Point of Sale 15 minutes 30 minutes 4 hours 
2 Email 12 hours 48 hours 24 hours 
2 Employee payroll 48 hours 96 hours 12 hours 
Priority Severe Moderate Minimal 
Loss of revenue, 
overtime costs, loss of 
customer loyalty, data 
loss 
Some revenue loss, 
overtime costs, customer 
annoyance 
Loss of revenue 
Greater that 300k per 
hour 
100-150k per hour <25k per hour 
3% 22% 60% 
Point of Sale
16 
Pillar 2: Scope the Potential Impact to the 
Organization 
Understand what has a negative impact on the business 
• Loss of data. 
• Reputation. 
• Legal requirements. 
• What’s the cost of a severe, moderate or minimal incident? 
• How long can we be 
down and survive? 
• Who will be impacted 
the most?
PILLAR 3
18 
Pillar 3: Understand your Capabilities 
A IR function consists of People, Processes and Technology 
The team must consist of individuals with the appropriate skills/experience 
for the incident response team. The effectiveness of the team depends on the 
technical skills and critical thinking abilities of its members. 
Create an incident response policy. The incident response policy is the 
foundation of the incident response function. As an important first step it defines 
what is considered an incident, establishes the organizational structure for incident 
response, defines roles and responsibilities and defines the reporting requirements. 
Identify the security technology defenses, logging and detection tools, forensics 
tools, system monitoring and communication platforms.
19 
Pillar 3: Understand Your Capabilities 
Team Roles 
• Executive Sponsor – Incident Response Owner and accountable for the IR 
function. Typically an officer of the company or CISO. 
• Incident Commander – Leads the team; Activates the team, trains the team, 
maintaining communication with stake holders. 
• Subject Matter Experts – Individuals with expertise, system access, training and 
experience with responding to incidents.
20 
Pillar 3: Understand Your Capabilities 
Who is on the team 
• Ensure that all members and their management understand their roles 
and responsibilities. 
• Education and training are critical. 
• Have a well defined Mission statement. 
• Identify other groups within and outside the organization that may need 
to participate in incident handling. 
• Identify 3rd parties that may be needed for expertise that is not normally 
available.
21 
Pillar 3: Understand Your Capabilities 
Processes 
• Incident response policy. 
• Incident response plan based on the incident response policy 
• Develop incident response procedures based on all threats not just based 
on likelihood. 
• Communication plan – the company directory is not adequate 
• Disaster recovery planning
22 
Pillar 3: Understand Your Capabilties 
Technological capabilities 
• Work with the SME’s 
• IDS/IPS 
• SIEM 
• AV/Malware 
• FIPS/FIDS 
• Monitoring tools 
• OS/Application logs 
• Network tools/logs 
• Network Flows 
• Vulnerability scanners 
• Forensic tools 
• Encryption tools 
• Database 
• Research tools
POLL
PILLAR 4
25 
Pillar 4: Know Your Threats and Prepare 
When asked why he robbed banks, Willie Sutton said 
“Because that is where all the money is…”
26 
Pillar 4: Know Your Threats and Prepare 
• What would an attacker 
gain by attacking you? 
• Monetary 
• Political 
• Prestige 
• Data 
• Control of infrastructure 
• Etc.. 
• What kind of attacker 
would attack you? 
• Insider threat/Disgruntled 
employee 
• State Sponsored 
• Hactivist 
• Hacker 
• Malicious vs. Non-malicious 
threats
27 
Pillar 4: Know Your Threats and Prepare 
• Drills 
• Desktop exercises 
• Functional Exercises 
• Full scale exercises 
Preparation 
Detection 
and Analysis 
Recovery 
Eradication Containment 
The exercise scenarios are designed to simulate technical, operational, 
communication and/or strategic responses to incidents with a view to reviewing and 
refining current capabilities.
28 
Pillar 4: Know Your Threats and Prepare 
• Overall goals 
– Examine information sharing 
– Assess decision making 
– Evaluate roles and responsibilities within the organization 
• Multi-group participation allows us to 
– Understand incident management across multiple departments and 
entities 
– Evaluate threat information sharing among the whole community 
– Understand roles and responsibilities 
– Test and evaluate Incident Response coordination
29 
Resources 
• Cyber Incident Response: Are business leaders ready? 
http://www.arbornetworks.com/news-and-events/press-releases/recent-press-releases/5160- 
economist-intelligence-unit-and-arbor-networks-research-show-83-percent-of-businesses-are- 
not-fully-prepared-for-an-online-security-incident 
• NIST Computer Security Incident Handling Guide 
http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf 
• State of Security Operations – HP 
https://ssl.www8.hp.com/ww/en/secure/pdf/4aa5-0501enw.pdf 
• 5 stages of defense: Understanding the kill chain 
http://h30458.www3.hp.com/us/us/discover-performance/security-leaders/2013/jul/5-stages-of- 
defense--understanding-the-kill-chain_1307229.html
■
31 
Upcoming Co3 Events 
• “Encryption: Who, What, When, Where, and Why It's Not 
a Panacea” 
– Webinar with Morrison Foerster: October 2, 2014, 1-2 pm 
– https://www4.gotomeeting.com/register/525395863 
• Cyber IP Expo, London, UK: October 8-9, 2014
One Alewife Center, Suite 450 
Cambridge, MA 02140 
PHONE 617.206.3900 
WWW.CO3SYS.COM 
“Co3 Systems makes the process of planning for a 
nightmare scenario as painless as possible, 
making it an Editors’ Choice.” 
PC MAGAZINE, EDITOR’S CHOICE 
“One of the hottest products at RSA…” 
NETWORK WORLD – FEBRUARY 2013 
“Co3…defines what software packages for 
privacy look like.” 
GARTNER 
“Platform is comprehensive, user friendly, and 
very well designed.” 
PONEMON INSTITUTE 
Richard White MBA CISSP CHP/CHSS 
Principal, Security Intelligence and operations 
Richard.paul.white@hp.com

More Related Content

What's hot

Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Oscar Ferreira
 
Physical access control
Physical access controlPhysical access control
Physical access controlAhsin Yousaf
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Securityleminhvuong
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics Avinash Mavuru
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionJOEL JESUS SUPAN
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplacedougfarre
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)hardik soni
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyArti Ambokar
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police ReportsJean Reynolds
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsMark S. Mahre
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityDhani Ahmad
 

What's hot (20)

Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0Cybersecurity domains-map-3.0
Cybersecurity domains-map-3.0
 
Red Team Framework
Red Team FrameworkRed Team Framework
Red Team Framework
 
Physical access control
Physical access controlPhysical access control
Physical access control
 
Module 10 Physical Security
Module 10   Physical SecurityModule 10   Physical Security
Module 10 Physical Security
 
Computer crimes and forensics
Computer crimes and forensics Computer crimes and forensics
Computer crimes and forensics
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Mobile Forensics
Mobile Forensics Mobile Forensics
Mobile Forensics
 
Basic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 EditionBasic Security Concepts JMSupan 2019 Edition
Basic Security Concepts JMSupan 2019 Edition
 
Physical Security In The Workplace
Physical Security In The WorkplacePhysical Security In The Workplace
Physical Security In The Workplace
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Access_Control_Systems_and_methodology
Access_Control_Systems_and_methodologyAccess_Control_Systems_and_methodology
Access_Control_Systems_and_methodology
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Four Types of Police Reports
Four Types of Police ReportsFour Types of Police Reports
Four Types of Police Reports
 
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security ControlsSOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
SOC-2 Framework - Plan, Budget, Design, Integrate & Audit Security Controls
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 

Viewers also liked

Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPHuntsman Security
 
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...David Castro
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security ManagementNick Krym
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion, Inc.
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples CounselingAtif Ghauri
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...David Castro
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsDavid Castro
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015Paul Hogan
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriAtif Ghauri
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningDell EMC World
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached Dell EMC World
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Spin Selling Fieldbook - Neil Rackham
Spin Selling Fieldbook - Neil RackhamSpin Selling Fieldbook - Neil Rackham
Spin Selling Fieldbook - Neil RackhamNirbhik Jangid
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...IBM Security
 
Corp Overview 11510
Corp Overview 11510Corp Overview 11510
Corp Overview 11510jduhaime
 

Viewers also liked (20)

Webinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWSWebinar: Data warehouse na nuvem da AWS
Webinar: Data warehouse na nuvem da AWS
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
Why You Should Be Selling Business Continuity Services (5 MSP Tips to Get Sta...
 
Outsourcing Security Management
Outsourcing Security ManagementOutsourcing Security Management
Outsourcing Security Management
 
Dizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the waterDizzion Channel Partner Training blow sales objections out of the water
Dizzion Channel Partner Training blow sales objections out of the water
 
Its Not You Its Me MSSP Couples Counseling
Its Not You Its Me   MSSP Couples CounselingIts Not You Its Me   MSSP Couples Counseling
Its Not You Its Me MSSP Couples Counseling
 
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
MSP Sales Tactic | Using Kaseya to Perform an IT Network Assessment to Win Ne...
 
MSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales LeadsMSP Sales Best Practice | How to Close Sales Leads
MSP Sales Best Practice | How to Close Sales Leads
 
To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015To MSSP or not to MSSP IISF 2015
To MSSP or not to MSSP IISF 2015
 
Security Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif GhauriSecurity Outsourcing - Couples Counseling - Atif Ghauri
Security Outsourcing - Couples Counseling - Atif Ghauri
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
MT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response PlanningMT 70 The New Era of Incident Response Planning
MT 70 The New Era of Incident Response Planning
 
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
MT 68 Hunting for the Threat: When You Don’t Know If You’ve Been Breached
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
SPIN Selling : HCL with CBA
SPIN Selling : HCL with CBASPIN Selling : HCL with CBA
SPIN Selling : HCL with CBA
 
Mass Customization
Mass CustomizationMass Customization
Mass Customization
 
Spin Selling Fieldbook - Neil Rackham
Spin Selling Fieldbook - Neil RackhamSpin Selling Fieldbook - Neil Rackham
Spin Selling Fieldbook - Neil Rackham
 
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
Building a Next-Generation Security Operation Center Based on IBM QRadar and ...
 
Corp Overview 11510
Corp Overview 11510Corp Overview 11510
Corp Overview 11510
 

Similar to How To Build An Incident Response Function

5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response PlanResilient Systems
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxAkramAlqadasi1
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxJkYt1
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksResilient Systems
 
TrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseCGTI
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceSami Benafia
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxPandiya Rajan
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004Donald E. Hester
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentResilient Systems
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehAnne Starr
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxAbraraw Zerfu
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber riskStephen Cobb
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Paul C. Van Slyke
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2TechSoup Canada
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeCloud Watchmen Inc.
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceSurfWatch Labs
 

Similar to How To Build An Incident Response Function (20)

5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptxColorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
Colorado-Society-of-CPAs-Cybersecurity-Presentation-v3_Feb8.pptx
 
nist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptxnist_small_business_fundamentals_july_2019.pptx
nist_small_business_fundamentals_july_2019.pptx
 
Incident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber AttacksIncident Response in the age of Nation State Cyber Attacks
Incident Response in the age of Nation State Cyber Attacks
 
TrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Ingenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM complianceIngenia consultants-9 basic steps towards TRM compliance
Ingenia consultants-9 basic steps towards TRM compliance
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
CONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptxCONTEXTUAL ARCHITECTURE.pptx
CONTEXTUAL ARCHITECTURE.pptx
 
IT Business Continuity Planning 2004
IT Business Continuity Planning 2004IT Business Continuity Planning 2004
IT Business Continuity Planning 2004
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Information Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptxInformation Security Risk Management and Compliance.pptx
Information Security Risk Management and Compliance.pptx
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
Setting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance OfficeSetting up an Effective Security and Compliance Office
Setting up an Effective Security and Compliance Office
 
How to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital PresenceHow to Mitigate Risk From Your Expanding Digital Presence
How to Mitigate Risk From Your Expanding Digital Presence
 

More from Resilient Systems

Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatResilient Systems
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarResilient Systems
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features Resilient Systems
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Resilient Systems
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Resilient Systems
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaResilient Systems
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeResilient Systems
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To PrepareResilient Systems
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUResilient Systems
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceResilient Systems
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 DaysResilient Systems
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksResilient Systems
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The MoneyResilient Systems
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsResilient Systems
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeResilient Systems
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramResilient Systems
 

More from Resilient Systems (20)

Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot SeatData Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
 
Co3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions WebinarCo3's Annual Review & Predictions Webinar
Co3's Annual Review & Predictions Webinar
 
By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features By Popular Demand: Co3's Latest and Greatest Features
By Popular Demand: Co3's Latest and Greatest Features
 
Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents Are We Breached How to Effectively Assess and Manage Incidents
Are We Breached How to Effectively Assess and Manage Incidents
 
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
 
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a PanaceaEncryption: Who, What, When, Where, and Why It's Not a Panacea
Encryption: Who, What, When, Where, and Why It's Not a Panacea
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
EU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response ImperativeEU Cyber Attacks And The Incident Response Imperative
EU Cyber Attacks And The Incident Response Imperative
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
How To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat IntelligenceHow To Turbo-Charge Incident Response With Threat Intelligence
How To Turbo-Charge Incident Response With Threat Intelligence
 
New CISO - The First 90 Days
New CISO - The First 90 DaysNew CISO - The First 90 Days
New CISO - The First 90 Days
 
How To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their TracksHow To Stop Target-Like Breaches In Their Tracks
How To Stop Target-Like Breaches In Their Tracks
 
The Target Breach – Follow The Money
The Target Breach – Follow The MoneyThe Target Breach – Follow The Money
The Target Breach – Follow The Money
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
You're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat LandscapeYou're Breached: Information Risk Analysis for Today's Threat Landscape
You're Breached: Information Risk Analysis for Today's Threat Landscape
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
How to Build a Successful Incident Response Program
How to Build a Successful Incident Response ProgramHow to Build a Successful Incident Response Program
How to Build a Successful Incident Response Program
 

Recently uploaded

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

How To Build An Incident Response Function

  • 1.
  • 2. 2 Introductions: Today’s Speakers • Ted Julian, Chief Marketing Officer, Co3 Systems • Richard White, MBA CISP CHP/CHSS, Solutions Principal, HP Security Intelligence and Operational Consulting
  • 3. 3 Agenda • The Four Pillars of an Incident Response function: – Pillar 1: Identifying Critical Assets and Risks – Pillar 2: Scope the potential impact to the organization – Pillar 3: Understand your capabilities – Pillar 4: Know your threats and prepare • Questions
  • 4. 4 About Co3’s Incident Response Management System MITIGATE Document Results & Improve Performance • Generate reports for management, auditors, and authorities • Conduct post-mortem • Update SOPs • Track evidence • Evaluate historical performance • Educate the organization ASSESS Identify and Evaluate Incidents • Assign appropriate team members • Evaluate precursors and indicators • Correlate threat intelligence • Track incidents, maintain logbook • Prioritize activities based on criticality • Generate assessment summaries PREPARE Improve Organizational Readiness • Appoint team members • Fine-tune response SOPs • Escalate from existing systems • Run simulations (firedrills / table tops) MANAGE Contain, Eradicate, and Recover • Generate real-time IR plan • Coordinate team response • Choose appropriate containment strategy • Isolate and remediate cause • Instruct evidence gathering and handling • Log evidence
  • 5. 5 Security Intelligence & Operations Consulting ESP Services Founded: 2007 Experience: • 30+ SOC Builds • 90+ SOC Assessments • 30+ SIOC Consultants worldwide Solution Approach: • People, Process, & Technology Accelerated Success: • Mature Project Methodology • Best Practices • Extensive Intellectual Capital Purpose: Ensure our customers are successful with ESP products by providing the right People, building the right Processes and delivering effective Technology.
  • 6. 6 HP’s industry-leading scale 10 out of 10 Top telecoms HP Security Professionals 5000+ 2.3billion Monthly security events 47m HP Secured User Accounts 9 out of 10 Major banks All major branches US Department of Defense 9 out of 10 Top software companies 8 Global Security Operations Centers Global SOC Planned regional SOC 900+ HP managed security customers
  • 8. 8 Pillar 1: Identifying Critical Assets and Risks Create an Asset and Threat Inventory • Asset Inventory – what are you trying to protect (people, processes, physical, data) • Threat Inventory – what are the threats (Cyber, Weather, Infrastructure, etc…) Asset Description Owner Category BU Date Vendor Qty Value Model No. Serial No. Marketing database Marketing database, customer list Bob ratchet Data ME Dept. 4/17/14 Oracle 1 $ 25,000 Web Server Linuc Serv er, apache web server; Debbie Thompson Hardware/Soft ware/Data Operations 9/3/14 Multiple 4 $1,200,000 $ - Name Host Name IP Address MAC Address Static Addressing Category URI WMServer1 WMServer1 10.100.4.128 00:AE:FE:01:08 10.100.4.128 /All Asset Categories/Prod WMServer2 WMServer2 10.100.4.130 01:AF:CB:02:09 10.100.4.130 /All Asset Categories/Prod WMServer3 WMServer3 10.100.4.127 00:AE:FE:01:08 10.100.4.127 /All Asset Categories/Prod WMServer4 WMServer4 10.100.4.125 01:AF:CB:02:11 10.100.4.125 /All Asset Categories/Prod WMServer10 WMServer10 10.100.4.121 00:AE:FE:01:00 10.100.4.121 /All Asset Categories/Prod DBServer3 DBServer3 10.101.4.99 01:AF:CB:02:21 10.101.4.99 /All Asset Categories/Prod
  • 9. 9 Pillar 1: Identifying Critical Assets and Risks • Identify the assets at a high level and work down – What is critical? – What is its value if lost? • Replacement cost, additional staffing, resource expenses, manual processing costs. • Lost revenue. – What are the dependencies and interdependencies. • Impact to people? • How will processes will be affected in other areas
  • 10. 10 Pillar 1: Identifying Critical Assets and Risks • Get the business partners involved in the data collection process – What is mission critical? – Where is critical or sensitive information stored or processed? – What locations are mission critical or high value? – Assess the impact on the organizations critical functions, operations, and customer. • Collect the information: Questionnaires/Interviews/workshops
  • 11. 11 Pillar 1: Identifying Critical Assets and Risks Threat • Fire • Flood • Cyber Attacks • Insider Fraud • Failed Backup • HVAC Failure • Hurricane • Terrorism • Data Theft • PII Disclosure • Power Failure • Phishing Attack • Loss of Key Staff • Virus Outbreak • Pandemic • Lawsuits
  • 12. 12 Risk Distribution Threat No. Fire R01 Flood R02 Cyber Attacks R03 Insider Fraud R04 Failed Backup R05 Virus Outbreak R06 HVAC Failure R07 Data Theft R08 PII Disclosure R09 Power Failure R10 Phishing Attack R11 Loss of Key Staff R12 10 50 100 Low-High R0 6 Medium- High High 05 25 R0 4 Low-Medium Medium High- Medium R0 1 R0 8 01 05 R0 3 R0 2 Low Medium-Low High-Low R1 2 R1 1 R0 9 R1 0 R0 7 R0 5 50 10
  • 13. POLL
  • 15. 15 Pillar 2: Scope the Potential Impact to the Organization Priority Asset/Business Process Recovery Time Objective (RTO) Maximum Tolerable Downtime (MTD) Recovery Point Objective (RPO) 1 Point of Sale 15 minutes 30 minutes 4 hours 2 Email 12 hours 48 hours 24 hours 2 Employee payroll 48 hours 96 hours 12 hours Priority Severe Moderate Minimal Loss of revenue, overtime costs, loss of customer loyalty, data loss Some revenue loss, overtime costs, customer annoyance Loss of revenue Greater that 300k per hour 100-150k per hour <25k per hour 3% 22% 60% Point of Sale
  • 16. 16 Pillar 2: Scope the Potential Impact to the Organization Understand what has a negative impact on the business • Loss of data. • Reputation. • Legal requirements. • What’s the cost of a severe, moderate or minimal incident? • How long can we be down and survive? • Who will be impacted the most?
  • 18. 18 Pillar 3: Understand your Capabilities A IR function consists of People, Processes and Technology The team must consist of individuals with the appropriate skills/experience for the incident response team. The effectiveness of the team depends on the technical skills and critical thinking abilities of its members. Create an incident response policy. The incident response policy is the foundation of the incident response function. As an important first step it defines what is considered an incident, establishes the organizational structure for incident response, defines roles and responsibilities and defines the reporting requirements. Identify the security technology defenses, logging and detection tools, forensics tools, system monitoring and communication platforms.
  • 19. 19 Pillar 3: Understand Your Capabilities Team Roles • Executive Sponsor – Incident Response Owner and accountable for the IR function. Typically an officer of the company or CISO. • Incident Commander – Leads the team; Activates the team, trains the team, maintaining communication with stake holders. • Subject Matter Experts – Individuals with expertise, system access, training and experience with responding to incidents.
  • 20. 20 Pillar 3: Understand Your Capabilities Who is on the team • Ensure that all members and their management understand their roles and responsibilities. • Education and training are critical. • Have a well defined Mission statement. • Identify other groups within and outside the organization that may need to participate in incident handling. • Identify 3rd parties that may be needed for expertise that is not normally available.
  • 21. 21 Pillar 3: Understand Your Capabilities Processes • Incident response policy. • Incident response plan based on the incident response policy • Develop incident response procedures based on all threats not just based on likelihood. • Communication plan – the company directory is not adequate • Disaster recovery planning
  • 22. 22 Pillar 3: Understand Your Capabilties Technological capabilities • Work with the SME’s • IDS/IPS • SIEM • AV/Malware • FIPS/FIDS • Monitoring tools • OS/Application logs • Network tools/logs • Network Flows • Vulnerability scanners • Forensic tools • Encryption tools • Database • Research tools
  • 23. POLL
  • 25. 25 Pillar 4: Know Your Threats and Prepare When asked why he robbed banks, Willie Sutton said “Because that is where all the money is…”
  • 26. 26 Pillar 4: Know Your Threats and Prepare • What would an attacker gain by attacking you? • Monetary • Political • Prestige • Data • Control of infrastructure • Etc.. • What kind of attacker would attack you? • Insider threat/Disgruntled employee • State Sponsored • Hactivist • Hacker • Malicious vs. Non-malicious threats
  • 27. 27 Pillar 4: Know Your Threats and Prepare • Drills • Desktop exercises • Functional Exercises • Full scale exercises Preparation Detection and Analysis Recovery Eradication Containment The exercise scenarios are designed to simulate technical, operational, communication and/or strategic responses to incidents with a view to reviewing and refining current capabilities.
  • 28. 28 Pillar 4: Know Your Threats and Prepare • Overall goals – Examine information sharing – Assess decision making – Evaluate roles and responsibilities within the organization • Multi-group participation allows us to – Understand incident management across multiple departments and entities – Evaluate threat information sharing among the whole community – Understand roles and responsibilities – Test and evaluate Incident Response coordination
  • 29. 29 Resources • Cyber Incident Response: Are business leaders ready? http://www.arbornetworks.com/news-and-events/press-releases/recent-press-releases/5160- economist-intelligence-unit-and-arbor-networks-research-show-83-percent-of-businesses-are- not-fully-prepared-for-an-online-security-incident • NIST Computer Security Incident Handling Guide http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf • State of Security Operations – HP https://ssl.www8.hp.com/ww/en/secure/pdf/4aa5-0501enw.pdf • 5 stages of defense: Understanding the kill chain http://h30458.www3.hp.com/us/us/discover-performance/security-leaders/2013/jul/5-stages-of- defense--understanding-the-kill-chain_1307229.html
  • 30.
  • 31. 31 Upcoming Co3 Events • “Encryption: Who, What, When, Where, and Why It's Not a Panacea” – Webinar with Morrison Foerster: October 2, 2014, 1-2 pm – https://www4.gotomeeting.com/register/525395863 • Cyber IP Expo, London, UK: October 8-9, 2014
  • 32. One Alewife Center, Suite 450 Cambridge, MA 02140 PHONE 617.206.3900 WWW.CO3SYS.COM “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” PC MAGAZINE, EDITOR’S CHOICE “One of the hottest products at RSA…” NETWORK WORLD – FEBRUARY 2013 “Co3…defines what software packages for privacy look like.” GARTNER “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Richard White MBA CISSP CHP/CHSS Principal, Security Intelligence and operations Richard.paul.white@hp.com

Editor's Notes

  1. Adapted from the standard Emergency Response Process of : Prepare Respond Recover Mitigate
  2. HP Security footprint 8 Global security operations centers 500 security professionals
  3. Car Example Business process flows examples to find the critical processes
  4. Email example: IT vs. business Valuation examples 5 dollar Horse and Plow example Its ok they are subjective Not all threats are malicious – network engineer says ooopps People want to associate a value to justify the expenses Start with your history to see what incidents have happened in the past
  5. Yes No I’m not sure (only one answer allowed)
  6. Well defined mission statement example z
  7. A good Incident Response Plan defines: Roles and responsibilities Description, goals and objectives Process for how to determine/declaring an incident Definition of different incident types and severity criteria Process flows from beginning to recovery Communication plans internally and externally Chain of command for each Incident Type
  8. Yes No I’m not sure (only one answer allowed)
  9. Accidental – ooops example Expect the unexpected Update plans often