Time
5 hours 19 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Transcription

00:00
Lesson 5.2 Declaring an incident and notifications
00:04
in this lesson, we will talk about the process of declaring a cyber incident and who has the authority to make that decision
00:13
understand the possible triggers that will require the declaration of a cyber incident
00:18
and identify potential people to notify after an incident has been declared?
00:25
Well, this is a good question to ask. And again, this is not the question to ask. In the midst of a cybersecurity incident
00:33
who decides about notifications who contacts law enforcement? If you're going to do that, who contacts the media, who contacts the public or customers or people who may have had their information breached as a result of a cyber incident?
00:48
You need to get all of this figured out ahead of time. Have a part of your eye rplan haven't practiced. When we talked about tabletop exercises on the last lesson,
00:58
it really should also include these stakeholders. A tabletop exercise. It's fine to do a few with just the i R team, but you should occasionally, at least once a year, to a major cyber incident tabletop that includes the CEO, the chief of staff, the chief legal officer and the chief
01:15
human resource is officer and their staffs so they can get used to how they would react in such an event.
01:26
So there are some certain notification triggers things like an organization can no longer provide critical services. This may require you declare a cyber incident and follow your process.
01:38
P I has been breached that, in and of itself may require you to declare an incident and take the appropriate notification steps.
01:47
Sensitive data has been breached, or there's an insider threat that is suspected. Now you're not going to, of course, notify the media that you've got an insider threat, but you might need to notify
02:00
you are safeguards and security people internal your chief security officer Legal HR. If you have an insider threat working group, assemble that group to talk through it. So what I'm really trying to get at is you should have certain checkpoints along the way
02:15
that if this happens, then you need to notify these people.
02:21
So some examples of folks that you may need to notify the C I O is traditionally one that will get notified early on on any type of cyber incident. The cyst So, of course, should be at the forefront of something like this. The chief of staff may also be in the loop.
02:37
The CFO. You might need contracts funding additional equipment,
02:42
anything like that. The CFO will be involved with. You might have to call back off duty certain members and get them in during the evening holidays. Weekends where you just need all hands on deck. And it might be their day off.
02:55
The general counsel or your legal department may be in the notification loop
03:00
system owner. So if you have an incident involving a system, you might need to get a hold of that business unit to tell them that their application is part of an investigation or has been compromised.
03:12
And law enforcement may also be somebody that needs to be notified in the event of a cyber attack or once said, the incident has been declared
03:23
quick question for this lesson. What is an example of a trigger that may cause an organization to declare a cyber incident? A sensitive data has been breached,
03:34
Be an insider threat is suspected,
03:37
see organization can no longer provide critical services or d all of the above.
03:46
If he answered. All of the above, you are correct. Those are all things that I went through that could
03:52
result in declaring a cyber incident for the organization.
03:57
The summary for this lesson is we talked about the process for declaring a cyber incident and who has the authority to make that decision again. I can't tell you who that is, but you need to define that and have that exact conversation with leadership. Say, OK, today we just found out that
04:15
our domain controller was compromised and as a result, all credentials air suspected to be compromised. And we already know that Attackers have logged into thes people's accounts.
04:27
Who, What would we do with that information? Who would make the decision to declare a cyber incident and have some leadership around the table and a bet that you're going to have some people scratching their heads cause they probably have never thought about this before. So again, good questions have before you actually need to have them,
04:45
and we talked about the triggers that will require the declaration of a cyber incident

Up Next

Incident Response Lifecycle

This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity incident response.

Instructed By

Instructor Profile Image
Josh Moulin
Instructor