Time
5 hours 19 minutes
Difficulty
Intermediate
CEU/CPE
5

Video Transcription

00:00
less than 1.6 working with manage security service providers or MSs Peas.
00:05
You mentioned before that we were going to talk about this more in depth. Um, here it is. So in the objectives for this session, we'll talk about understanding the different operating models oven I Our team, including some hybrid models.
00:17
Second, will discuss the impacts of regulations and cyber insurance on IR teams and organizations. And third, how racy, which we were just introduced to last session, can be used for MSs Pisa's Well.
00:32
So let's talk through some hybrid and external resource is that certain may leverage.
00:37
A lot of organizations are in fact, moving to a hybrid model because they just can't staff enough. Resource is internally or frankly, can't afford the incident response capabilities that they might need to keep them in house, as we see in increased complexities with incident response
00:54
and just the difficulty in recruiting and retaining staff. This is certainly a model that is appetizing to a lot of individual companies and organizations.
01:03
We also see organizations have an incident response retainer with an outside company. So you think of the large companies that do this regularly, like fireeye and stroke straws. Friedberg and other organizations that do incident response Deloitte and KPMG, for example,
01:19
they may have every trainer with them. There's also a lot of small and medium size businesses that specialize in incident response.
01:27
They also have retainers available
01:30
now. Cyber insurance is becoming very popular and also oftentimes requires a retainer. So you may see cyber insurance for companies telling them they have to have a retainer with an outside organization. And in fact, I've seen cyber insurance policies that require the company to use
01:49
a, um requires the company getting the policy to use an instant responder company
01:55
that they choose. So the cyber insurance company may have a list of five different companies that you could go to and get a retainer with. So that is something to just keep in mind. Also, without a retainer, though, organizations find it really difficult to get an I R consultant or a team on site.
02:15
During an incident without any previous relationship,
02:17
these companies were busy. They are frequently booked out, and you don't necessarily want to wait a couple of weeks to get somebody on site. If you can find somebody that can come in, then you're going to have to quickly go through all the contracts. The legal department have to review them, your CFO,
02:35
and it's going to cost a lot of money to just get somebody with no relationship in the door
02:39
to do some sort of an incident response engagement for you.
02:45
So we'd looked at racy before and on this example on the slide. You see how you might be able to use it with external firms as well. So on the left hand side, you would add roles for the MSs P and specifically say, under our contract or service level agreement with the MSs p
03:04
their response before in point detection and response.
03:07
Digital forensics, vulnerability, scanning or whatever it may be. But it's really helpful to just visually have a single page that shows what you're on the hook for. Internally. Vice, what you're MSs P is being paid to dio.
03:21
Make sure that racy is used also to deconflict with service low level agreements or s. L. A's and contractual requirements. So it makes it really clear if you read through the contract and it says the MSs P is doing these things and you put that on there,
03:37
then you might share that with the MSs Pia's well, and make sure that everybody's on the same page and you have concurrence from all involved, and it also helps to if something goes wrong, then you can show your internal leadership. This is what they do. This is what we dio,
03:52
and it was either our fault or was their fault, and we're working through it. But it is helpful just to know
03:57
what those agreements are and have them visually available.
04:02
So with MSs peas,
04:04
true or false, many cyber insurance companies require an IR retainer.
04:14
The answer to that, remember, is true. A lot of cyber insurance policies will in fact require you to have a retainer sometimes if you have an M SSP that will also include access to their Incident Response team. But you just want to make sure it meets the requirements of the cyber insurance policy.
04:31
Second quiz question.
04:33
Why would an IR manager want to use racy for em? SSP contracts?
04:39
A. It provides a way to clearly identify the roles and responsibilities of the organization and the MSs P
04:46
B. Because it's required by law,
04:49
see it may help guide decisions in accordance with S L. A's and contractual language.
04:55
D. None of the above
04:57
or E. Both A and C are correct.
05:03
All right for this one, it's e both a NCR correct. It does help clearly delineate the swim lanes and roles and responsibilities,
05:13
and it also may help guide organizations as you look through the SLS and contractual language.
05:19
So in summary, with this module,
05:24
we have looked at some different operating models. Oven I our team, including hybrid models.
05:29
We looked at how racy can be used with MSs peas and also the impacts of regulations and cyber insurance on incident response teams and organizations.

Up Next

Incident Response Lifecycle

This intermediate-level course will provide the student with in-depth instruction on the lifecycle of cybersecurity incident response.

Instructed By

Instructor Profile Image
Josh Moulin
Instructor