Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:06
Welcome to the Pell. No out to a network Cyber Security Academy, Secure Business Systems Administration Cyberattack Lifecycle Restoration presentation.
00:19
While complete restoration of business operations and services does occur in the re mediation phase of the Cyberattack Lifecycle management plan, the restoration process actually begins as soon as an attack is detected
00:34
during a cyberattack. Cybersecurity administrators need to quickly detect and protect Resource is that are affected by the attack.
00:42
Removing services offline is one step forward in protecting an eventual restoration.
00:49
Once a response playbook has been consulted
00:52
and the first stage of the attack has been mitigated, then the cyber security administrative stakeholders need to work together and plan a restoration sequence of events
01:07
in most incidents. Events would happen in the following sequence. First attack detection, second event classifications, third communications and forth response.
01:19
However, as aforementioned response, events may begin immediately upon attack detection,
01:27
so attack detection can begin by looking at anomalies or unusual activities and then applying additional inspection reviewing logs an additional monitoring to gauge the scope of the attack.
01:42
At the detection phase, testing an inspection of normal business operations should also be performed in all areas, even those that do not seem to be adversely affected.
01:53
It could be a big mistake to assume that the attack scope is focused and limited to just one set of resource is
02:00
any available resource is that can be easily taken off line should be quarantined then Backup processes for all critical operations should be performed as soon as possible.
02:15
An incident response plan should serve as guidance for deterring the attack.
02:19
At first, detection of words need to be sent to members of an incident response team and also to any business stakeholders whose re sources are affected.
02:28
Resource is that are targeted should be taken off line as soon as possible and then, as more information is gathered, declassification for the attack and determine the scope of what needs to be performed.
02:40
If an attack escalates, so should the classifications.
02:46
No attempts to restore services should be performed until the full scope of the attack is determined.
02:54
It's important that response team efforts are coordinated when responders start to act independently. Their response efforts can be fractured, conflicting and ineffective.
03:06
Communications with external partners and stakeholders should be performed as soon as possible. But Onley when a unified message can be delivered.
03:14
Human resource is legal and other managerial teams should coordinate and approve any messages to outside parties.
03:24
An incident response plan should have instructions for rapid re mediation.
03:30
Rapid re mediation could be a focused restoration for only a small partial set of affected resource is, but should also consider prioritizing the most critical set of business operations and services.
03:43
Forensic measures should also be clearly identified in any rapid re mediation response.
03:49
Restorations should not interfere with any collection of evidence
03:55
during restoration processes. Stakeholders should receive status updates as to which restoration measures have been performed and how systems testing is progressing if possible, or restoration, timeline should also be communicated.
04:12
The severity of an incident, as outlined by classifications that are described in the Incident Response Plan, should dictate the membership of the response team and who will receive notification and updates as re mediation proceeds.
04:27
The business response team should be fully consulted before any delivery of any public notifications.
04:35
Administrators who have worked through a cybersecurity attack will attest to the difficulties of crafting proper responses and re mediation.
04:44
Critical information is often discovered after a response has been put into place and the gathering of data and evidence related to into attack can be delayed and fragmented.
04:56
An enterprise security solutions such as Palo Alto Networks Cortex XDR can dramatically limit the effects of a cybersecurity attack by providing a deep set of metrics in real time. Security administrators then can use that data to determine a more focused and accurate response
05:14
in significantly reduced response times.

Up Next