API enables many ways to get data from systems and people
The reports have been posted into the site
These are real examples
The Incident manager can choose to analyse them
IM has clear understanding of what an external attack can be, and its causes
He adds them to the external attack analysis
He rearranges the attacks to focus on the sql attack
He in now starting a incident response process, where the nature of the attack is being investigated
This is via an assessment of 16 areas and 100 causes
He finds a problem area
An recommends a course of action
This process can go through some 100 steps
An for multiples ….
Introduce Steve Pomfret
Simple use cases, getting more ambitious
Implementation review with standards and best practices in software development
Reporting and incident management