welcome to this calls on Enterprise Security Case management.
This course will help you gain a greater understanding of the procedures and requirements of managing cases related to security events and incidents in an enterprise environment. This course assumes you have knowledge off incident response and handling methodologies such as mist
knowledge off the CIA, triad
knowledge off security principles such as least privilege and need to know.
Experience identifying and remediating security events and incidents
as well as knowledge off seem and sore tools, which will be also beneficial
My name is Seth Anoka, and I've been working in I T and cybersecurity for the last 13 years.
My work focuses primarily on digital forensics and incident response,
helping public and private enterprises and governments prepare for incidents and breaches
and assisting them during incidents when they go.
I have multiple sand certifications, a monster of I t. In network security and in my spare time, I'm a competitive power lift up.
I'm originally from Australia, but working as an incident response consultant takes me to a lot of different locations globally.
Lastly, everyone should feel free to connect with me on LinkedIn.
This course has some supplemental materials attached to it.
One is a chain of custody template or reform that you can use to record chain of custody for your evidence.
Secondly, you have a computer or a mobile examination form for recording information about evidence items which are being collected or imaged.
Finally, there is a certificate of destruction template which can be used when you securely arrays, media or data to provide stakeholders with confirmation that the data has actually been deleted.
This course is intended for anyone who is currently or wishes to become a security practice. You know,
this could include sock teams, threat hunters, digital forensic investigators or incident responders.
This course is equally valuable for executive leaders and board members who would like or who require a better grasp of security case management processes and work clothes.
Our overarching objectives are to provide you with an idea of how best to name both cases and evidence related to them.
We'll cover the importance off chain of custody,
including the relevant stakeholders and the fundamental process which should be followed to maintain the integrity of evidence.
We'll discuss secure data storage, data retention policies and procedures,
meaning how long to keep data after a case has been closed, as well as when and how to securely wipe case data or evidence,
contemporaneous notes, which among the most important expects off a security case,
will also be covered in detail, indicating which information must be captured
when, how and by whom.
And finally, we'll talk about case management, work flows, severity and priority classifications as well as escalations.
So I hope you'll join me for our next lesson, which will delve into naming conventions
for both cases as a whole and for evidence which has captured or created during an investigation.