3 hours 54 minutes
Okay, so now that we've kind of defined what an incident is and what incident response is, let's look at the incident response Life cycle.
And of course, we start with preparation. Then we look toe, identify something as an incident. We contain the incident we eradicate and were mediate the situation. And then we document,
All right. So as we move on to talking about preparation again, this is an an essential piece that the scissors oh is heavily involved with and making sure that we're prepared for an incident. So we're gonna coordinate the planning and the design of our plans.
And again, this isn't something that Isa scissors do by myself.
I'm gonna have a team that I work with across various functions within the organization, understanding the various business processes of business units and what's essential to them and then looking at potential vulnerabilities that an instance on incident could exploit. So I'm working with the team.
Um, I start off by, like I said, working with the management units
and trying to determine what their requirements are. You know, things like the Web presence must be up and running within 30 minutes of an incident or whatever that might be. These are critical in our chief.
Um, resource is this is, uh there's that these air, the applications that are critical, the hospice,
So ultimately, preparing part of preparing is collecting information. And in order to do that, we have to make sure we're working with drug people, usually business unit leaders or managers. Very good place to start.
All right, now, really, before I can get any it before I can get anywhere of this 19. You see management and make sure that they're on board and ultimately, to make sure that they're committed to developing these plans and already said,
this process is people
really have to be provided. And if senior management isn't on board, none of it matters.
All right, So, uh, we're gonna get a plan for implementing, and basically, that plan is gonna consist of policies and procedures. Document document. It approaches.
What sort of criteria have we define? An incident. What sort of criteria has to be met to access or to initiate the incident response plan? Um,
criticality is something we'll talk about disaster recovery and business continuity planning in the next section. But ultimately criticality deals with how time sensitive a service or process is. So, for instance, when we look at critical resource is their critical based on essentially,
uh, how much damage
the organization suffers, based on the time that that resource is down. So, for instance, if you look at an organization like Amazon, think about how much money Amazon must lose.
If their server their Web servers, are down for 15 minutes, for instance, Just think about how tremendous the impact would be just for 15 minutes of lost sales time with Amazon, their Web presence is extremely critical. So what we're looking at is we're looking at
those elements that support our business,
that are where we would suffer the greatest laws without them. And ultimately what we want to do is we want to establish periods of criticality. So, for instance, for those elements that are most critical,
how long can they be down?
Less than 10 minutes less than an hour? Less than six hours? It depends on the business, but ultimately we're gonna define categories of criticality and assigned those categories to the process.
All right, we got a look at what our capability is in house. Like I said, Do we really have? The resource is? And if not, we need to think about acquiring those Resource is or figuring out how we're gonna accomplish. Instant response will also document
how we're going to conduct our review
after an incident. Will create the documents for lessons learned or postmortem and making sure that we can collect the information after an incident does transpire. And then it changes need to be made as the result of an incident.
We need to make sure that there's a change management procedure
in place, that we don't just go around making major reactions to issues, but we have a full process in place that's gonna include submitting the change request, evaluating the change of West, testing it, documenting it and then implementing it. So with preparations, there are a lot of things that we have to do
before we jump right into the process
off responding to an incident. We have to be ready before we do that
Incident Response Lifecycle
This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity ...
5 CEU/CPE Hours Available
Certificate of Completion Offered
Privacy Program Management
In this Privacy Program Management training course, students will learn privacy program strategies, applicable laws ...
4 CEU/CPE Hours Available
Certificate of Completion Offered