Ready to Start Your Career?

Manage Evidence and Preserve Data by Properly Managing Security Cases

Jenna Crawford's profile image

By: Jenna Crawford

April 13, 2020

Security Incidents and Breaches

It seems like every week, there are breaking news articles on the latest security incidents and security breaches to various organizations. Have you ever wondered how security professionals handle cases for these incidents and security events? Are you a security professional who regularly handles incidents or security cases and wonder if you are handling the evidence and case data correctly? If you answered yes to either of these questions or if you are interested in learning more about how to handle incidents and security breaches, keep reading!

Handling incidents and security breaches is usually a job for cybersecurity professionals, but these situations can be extremely time-sensitive and may require support or assistance from additional team members. Managing enterprise security cases for these incidents comes with a lot of responsibility, and it can be overwhelming trying to capture as much relevant, reliable information as possible while simultaneously ensuring that the evidence being collected is unimpeachable if the case goes to court. Preparation is key for properly handling these cases, which is where training comes into play.

Enterprise Security Case Management Course

In Cybrary’s new Enterprise Security Case Management course, Instructor Seth Enoka does a fantastic job of logically breaking down the basics of case management to help you prepare for properly handling cases involving incidents and security breaches. This course consists of 6 easy-to-follow modules designed to help cybersecurity practitioners understand the important aspects of how to properly handle evidence and case data to preserve their integrity securely. The following topics are covered in this Enterprise Security Case Management course:

  • Case/Evidence Naming Conventions
  • Chain of Custody
  • Capturing Evidence Metadata
  • Contemporaneous Notes
  • Logical & Physical Storage
  • Data Retention, Destruction, & Backup
  • Workflow & Managing Cases
  • Priority & Severity
  • Deadlines & Service Level Agreements
  • Escalation
  • Case Management CIA Triad

This course includes information to assist in the development of the following competency areas to assist cybersecurity professionals in optimizing performance and career success:

  • Client Relationship Management
  • Workforce Management
  • Policy Management
  • Incident Management
  • Conflict Management

Enterprise Security Case Management is an advanced course that is included in Cybrary’s “Become a CISO” career path. This career path includes more than 25 courses, virtual labs, and practice tests to guide you through a structured, hands-on training path to help you become a successful Chief Information Security Officer (CISO). This career path is geared toward preparing you to pass the ISACA CISM1 and EC-Council Certified CISO2 certification exams.

Create an Account To Enhance Your Knowledge on Cybersecurity:




Schedule Demo