SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
Incident Management and Response
CISO Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Definition ,[object Object],[object Object],[object Object]
Incident Management and Response Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Outcomes of Incident Management and Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scope & Charter of  Incident Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Responsibilities  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Senior Management Commitment ,[object Object],[object Object],[object Object],[object Object]
Desired State ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Challenges in Developing an Incident Management Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Policies and Standards ,[object Object],[object Object],[object Object],[object Object],[object Object]
Personnel ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Roles and Responsibilities
Roles and Responsibilities (continued)
Roles and Responsibilities (continued)
Skills ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current State of Incident Response Capability ,[object Object],[object Object],[object Object],[object Object]
History of Incidents ,[object Object],[object Object],[object Object]
Risk Tolerance ,[object Object],[object Object],[object Object]
Integrating a BIA Into Incident Response ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* Should be based on BIA
Integrating RTO & RPO Into Incident Response ,[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Elements of an Incident Response Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Organizing, Training and Equipping the Response Staff ,[object Object],[object Object],[object Object],[object Object],[object Object]
Recovery Planning and Business Recovery Processes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recovery Strategies ,[object Object],[object Object],[object Object],[object Object]
Incident Management and Response Teams ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Notification Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Periodic Testing of the Response and Recovery Plans ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Testing for Infrastructure and Critical Business Applications ,[object Object],[object Object],[object Object],[object Object]
Type of Tests ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ensuring Execution as Required ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],* - The CISO often serves as facilitator
Establishing Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Requirements for  Evidence ,[object Object],[object Object],[object Object],[object Object]
Post-event Reviews ,[object Object],[object Object],[object Object],[object Object]
Contact Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
November 2011 ISACA

Contenu connexe

Tendances

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations centerCMR WORLD TECH
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsLearningwithRayYT
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical HackingS.E. CTS CERT-GOV-MD
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation centerMuhammad Sahputra
 
Threat Hunting
Threat HuntingThreat Hunting
Threat HuntingSplunk
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSJohn Gilligan
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes ObserveIT
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About ComplianceDinesh O Bareja
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat IntelligenceSirius
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical securityKarthikeyan Dhayalan
 

Tendances (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Types of Threat Actors and Attack Vectors
Types of Threat Actors and Attack VectorsTypes of Threat Actors and Attack Vectors
Types of Threat Actors and Attack Vectors
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
Penetration testing & Ethical Hacking
Penetration testing & Ethical HackingPenetration testing & Ethical Hacking
Penetration testing & Ethical Hacking
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Soc
SocSoc
Soc
 
Next-Gen security operation center
Next-Gen security operation centerNext-Gen security operation center
Next-Gen security operation center
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Information Security It's All About Compliance
Information Security   It's All About ComplianceInformation Security   It's All About Compliance
Information Security It's All About Compliance
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
CISSP - Chapter 3 - Physical security
CISSP - Chapter 3  - Physical securityCISSP - Chapter 3  - Physical security
CISSP - Chapter 3 - Physical security
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
Cyber kill chain
Cyber kill chainCyber kill chain
Cyber kill chain
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 

En vedette

EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONLennart Winqvist
 
Hyperion Planning Security
Hyperion Planning SecurityHyperion Planning Security
Hyperion Planning Securityadivasoft
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Periodic Reassessment, Continuous Improvement of Finance Operations
Periodic Reassessment, Continuous Improvement of Finance OperationsPeriodic Reassessment, Continuous Improvement of Finance Operations
Periodic Reassessment, Continuous Improvement of Finance OperationsCognizant
 
CA Service Desk Administrator Guide with Examples
CA Service Desk Administrator Guide with ExamplesCA Service Desk Administrator Guide with Examples
CA Service Desk Administrator Guide with ExamplesArshad Havaldar
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)Axios Systems
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationPrudentialSolutions
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Resilient Systems
 
Planning learn step by step
Planning learn step by stepPlanning learn step by step
Planning learn step by stepksrajakumar
 
Assessing Your Company's Cloud Readiness
Assessing Your Company's Cloud ReadinessAssessing Your Company's Cloud Readiness
Assessing Your Company's Cloud ReadinessAmazon Web Services
 

En vedette (15)

EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTIONEHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
EHSM PUBLIC SECTOR CASE MANAGEMENT SOLUTION
 
Hyperion Planning Security
Hyperion Planning SecurityHyperion Planning Security
Hyperion Planning Security
 
Incident Response
Incident Response Incident Response
Incident Response
 
Periodic Reassessment, Continuous Improvement of Finance Operations
Periodic Reassessment, Continuous Improvement of Finance OperationsPeriodic Reassessment, Continuous Improvement of Finance Operations
Periodic Reassessment, Continuous Improvement of Finance Operations
 
Process Improvement Roadmap
Process Improvement RoadmapProcess Improvement Roadmap
Process Improvement Roadmap
 
CA Service Desk Administrator Guide with Examples
CA Service Desk Administrator Guide with ExamplesCA Service Desk Administrator Guide with Examples
CA Service Desk Administrator Guide with Examples
 
Ca Service Desk Presentation
Ca Service Desk PresentationCa Service Desk Presentation
Ca Service Desk Presentation
 
ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)ITIL Practical Guide - Continual Service Improvement (CSI)
ITIL Practical Guide - Continual Service Improvement (CSI)
 
It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
ITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 FoundationITSM (IT Service Management) & ITIL V3 Foundation
ITSM (IT Service Management) & ITIL V3 Foundation
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Mapa mental ITIL
Mapa mental ITILMapa mental ITIL
Mapa mental ITIL
 
Planning learn step by step
Planning learn step by stepPlanning learn step by step
Planning learn step by step
 
Network Operation Center Best Practices
Network Operation Center Best PracticesNetwork Operation Center Best Practices
Network Operation Center Best Practices
 
Assessing Your Company's Cloud Readiness
Assessing Your Company's Cloud ReadinessAssessing Your Company's Cloud Readiness
Assessing Your Company's Cloud Readiness
 

Similaire à Incident Management and Response Overview

A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdfDaviesParker
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
Strategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxStrategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxshortarmssolution
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcpAdv Prashant Mali
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCognizant
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency planRMC
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by FirstMutualHoldings
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCentextech
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxjuliennehar
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security AssessmentFaheem Ul Hasan
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security programWilliam Godwin
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security programWilliam Godwin
 
Bcm Roadmap
Bcm RoadmapBcm Roadmap
Bcm Roadmapbtrmuray
 
BCM Roadmap
BCM RoadmapBCM Roadmap
BCM Roadmapbtrmuray
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji JacobBeji Jacob
 
IT 552 Module Five Assignment Rubric The purpose of t.docx
IT 552 Module Five Assignment Rubric  The purpose of t.docxIT 552 Module Five Assignment Rubric  The purpose of t.docx
IT 552 Module Five Assignment Rubric The purpose of t.docxchristiandean12115
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 

Similaire à Incident Management and Response Overview (20)

Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Strategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptxStrategic Essentials for Effective Incident Response Planning.pptx
Strategic Essentials for Effective Incident Response Planning.pptx
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
Qatar Proposal
Qatar ProposalQatar Proposal
Qatar Proposal
 
Coordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management PlanningCoordinating Security Response and Crisis Management Planning
Coordinating Security Response and Crisis Management Planning
 
Buisness contingency plan
Buisness contingency planBuisness contingency plan
Buisness contingency plan
 
Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by Assuring Digital Strategic Initiatives by
Assuring Digital Strategic Initiatives by
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized Businesses
 
Topic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docxTopic Describe each of the elements of a Business Continuity Plan .docx
Topic Describe each of the elements of a Business Continuity Plan .docx
 
Physical Security Assessment
Physical Security AssessmentPhysical Security Assessment
Physical Security Assessment
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
Bcm Roadmap
Bcm RoadmapBcm Roadmap
Bcm Roadmap
 
BCM Roadmap
BCM RoadmapBCM Roadmap
BCM Roadmap
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
IT 552 Module Five Assignment Rubric The purpose of t.docx
IT 552 Module Five Assignment Rubric  The purpose of t.docxIT 552 Module Five Assignment Rubric  The purpose of t.docx
IT 552 Module Five Assignment Rubric The purpose of t.docx
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 

Plus de Marc Vael

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as cisoMarc Vael
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersMarc Vael
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationMarc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?Marc Vael
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controlsMarc Vael
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeMarc Vael
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutMarc Vael
 

Plus de Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 

Dernier

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 

Dernier (20)

Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 

Incident Management and Response Overview

Notes de l'éditeur

  1. Content to Emphasize: The CISM candidate must have a thorough understanding of the knowledge statements in order to pass the CISM exam. Please explain that the learning objectives/tasks are what a CISM is expected to be able to do. The tasks will relate to knowledge statements. It may be helpful to explain that the CISM must know what the core business of the organization is if they hope to demonstrate to executive management how security can help to enable the business. Section one of the chapter in the 2011 manual provides an overview of the content as well as the task and knowledge statements. The relationship of the task statements to the knowledge statements is included on pages 232-238. In addition, an explanation is provided for each knowledge statement, it’s related key concepts and reference to content in the section of the chapter. Review Manual Reference Pages: pgs. 230-239
  2. Incident management is defined as the capability to effectively manage unexpected disruptive events with the objective of minimizing impacts and maintaining or restoring normal operations within defined time limits. Incident response is the operational capability of incident management that identifies, prepares for and responds to incidents to control and limit damage; provide forensic and investigative capabilities; and maintain, recover and restore normal operations as defined in service level agreements (SLAs). Review Manual Reference Page: pg. 238
  3. Content to Emphasize: Incident Management and Response is the operational part of risk management. It is the activities that take place as a result of unanticipated attacks, losses, theft, accidents or any other unexpected adverse events that occur as a result of the failure or lack of controls. The purpose of incident management and response is to manage and respond to unexpected disruptive events with the objective of controlling impacts within acceptable levels. These events can be technical, such as attacks mounted on the network via viruses, denial of service, or system intrusion, or they can be the result of mistakes, accidents, or system or process failure. Disruptions can also be caused by a variety of physical events such as theft of proprietary information, social engineering, lost or stolen backup tapes or laptops, environmental conditions such as floods, fires, or earthquakes, and so forth. Any type of incident that can significantly affect the organization’s ability to operate or that may cause damage must be considered by the information security manager and will normally be a part of incident management and response capabilities. As with other aspects of risk management, risk and business impact assessments (BIA) form the basis for determining the priority of resource protection and response activities. Incident management and response is a part of business continuity planning (BCP), as is disaster recovery. As “first responders” to adverse information security-related events, the objective is to prevent incidents from becoming problems, and to prevent problems from becoming disasters. Review Manual Reference Pages: pg. 250
  4. Outcomes of good incident management and response will be an organization that can deal effectively with unanticipated events that might threaten to disrupt the business. The organization will have sufficient detection and monitoring capabilities to ensure incidents are detected in a timely manner. There will be well-defined severity and declaration criteria as well as defined escalation and notification processes. Personnel will be trained in the recognition of incidents, the application of severity criteria, and proper reporting and escalation procedures. The organization will have response capabilities that demonstrably support the business strategy by being responsive to the criticality and sensitivity of the resources protected. It will serve to proactively manage risks of incidents appropriately in a cost-effective way and will provide integration of security related organizational functions to maximize effectiveness. It will provide monitoring and metrics to gauge performance of incident management and response capabilities. It will periodically test its capabilities and ensure that information and plans are updated regularly, are current, and accessible when needed. Review Manual Reference Page: pg. 253
  5. An incident management charter is a document that formally establishes the IMT, and documents its responsibility to manage and respond to security incidents. The charter also delegates the authority to take necessary actions and to make decisions prior to, during, and after an incident. As incident management is broader than incident response activities, the charter should also provide authority to implement proactive measures, vulnerability management and other incident management services. Sections of the charter document should include: • Mission —Describes the overall goals of the team and the activities that fall within the team’s scope of responsibility. This might include such tasks as responding to all incidents, minimizing their impact, and collecting data and evidence for further investigation and potential prosecution. • Scope —Defines the constitution of the IMT. The scope may be different for each organization. Some common choices of IMT scope include: • Organizational structure —Documents how the IMT is organized from a management perspective, how the members of the team are managed and how the team reports to upper-level management. • Information flow —Describes how information flows before, during and after an incident. First, this section describes how a potential security incident is reported to the IMT, and provides contact information for doing so. Second, it describes how the IMT communicates information about an incident to: – Senior management – Company employees – Business partners (e.g., suppliers, collaborators) – Regulatory organizations – Other stakeholders – The public • Services provided —Documents the specific services the IMT provides. This is based on the mission statement (above), and may include services such as incident response, policy development, compliance testing and user education. Review Manual Reference Pages: pg. 254
  6. The approach to incident response may vary depending on the situation, but the goals are constant. These goals include: • Containing the effects of the incident so that damage and losses do not escalate out of control • Notifying the appropriate people for the purpose of recovery or to provide needed information • Recovering quickly and efficiently from security incidents • Minimizing the impact of the security incident • Responding systematically and decreasing the likelihood of recurrence • Balancing operational and security processes • Dealing with legal and law enforcement-related issues Review Manual Reference Page: pg. 255
  7. As is the case with other aspects of information security, senior management commitment is critical to the success of incident management and response. It is a component of risk management and the same rationale and justification will serve. A business case can be made so that effective incident management and response may be a less costly option than attempting to implement controls for all possible conditions. Incident management and response can be part of the trade-off that may reduce the cost of risk management efforts by allowing higher levels of acceptable risk. Adequate incident response, in combination with effective information security, creates a practical risk management solution that may be more cost effective in the long run and the most prudent resource management decision. Review Manual Reference Pages: pg. 255
  8. Since incident management and response serves as the fire brigade, ambulance service and emergency room for the organization’s information assets, it must effectively address a wide range of possible unexpected events, both electronic and physical. It will need to have well-developed monitoring capabilities for key controls, whether procedural or technical, to provide early detection of potential problems. It will have personnel trained in assessing the situation, capable of providing triage, managing effective responses that maximize operational continuity and minimize impacts. The incident managers will have made provisions to capture all relevant information and apply previously learned lessons. They will know when a disaster is imminent and have well-defined criteria, the experience, knowledge, and the authority to invoke the disaster recovery processes necessary to maintain or recover operational status. Review Manual Reference Page: pgs. 255 - 256
  9. Review Manual Reference Pages: pgs. 258 - 259
  10. The incident response plan must be backed by well-defined policies, standards and procedures. A documented set of policies, standards and procedures is important to: • Ensure that incident management activities are aligned with the IMT mission • Set correct expectations • Provide guidance for operational needs • Maintain consistency and reliability of services The lack of suitable policies and supporting standards may hinder incident management capabilities. Review Manual Reference Page: pg. 259
  11. Content to Emphasize: An IMT usually consists of an information security manager, steering committee/advisory board, permanent/dedicated team members and virtual/temporary team members. The information security manager usually leads the team. In larger organizations, it may be more effective to appoint a separate IRT leader/manager that focuses on responding to incidents. Above the information security manager, there is a set of senior management executives in a group called security steering group (SSG) or security advisory board. The SSG is responsible for approving the charter and serves as an escalation point for the IMT. The SSG also approves deviations and exceptions to normal practice. Review Manual Reference Page: pg. 260
  12. Review Manual Reference Pages: pg. 261
  13. Review Manual Reference Pages: pg. 261
  14. Review Manual Reference Pages: pg. 261
  15. Content to Emphasize: To build an incident response team with capable incident handlers, organizations need people with certain skill sets and technical expertise, with abilities that enable them to respond to incidents, perform analysis tasks, and communicate effectively with the constituency and external contacts. They must also be competent problem solvers, must easily adapt to change, and must be effective in their daily activities. The set of basic skills that incident response team members need can be separated into two broad groups: • Personal skills —Major parts of the incident handler’s daily activity. • Technical skills Review Manual Reference Page: pgs. 260 - 262
  16. Most organizations have some sort of incident response capability, either ad hoc or formal. The information security manager must identify what is already in place as a basis for understanding the current state. There are many ways to do this; several methods that can be used are: • Survey of senior management, business managers and IT representatives —A survey is useful to find out how the incident management capability has been performed in the past or perception of such capability. • Self-assessment —Self-assessment is conducted by the IMT against a set of criteria to develop understanding on current capabilities. This is the easiest to do without requiring participation from many stakeholders. The disadvantage of this method includes the limited view on current capability and may not be in line with stakeholders’ perceived capability. • External assessment or audit —The most comprehensive option that combines interviews, surveys, simulation and other assessment techniques in the assessment. This option is normally used for an organization that already has an adequate incident management capability but is further improving it or reengineering the processes. Review Manual Reference Page: pg. 264
  17. Past incidents (both internal and external) can provide valuable information on trends, types of events, and business impacts. This information is used as an input to the assessment of the types of incidents that must be considered and planned for. Review Manual Reference Page: pg. 264
  18. Risk tolerance is the same as acceptable risk which, in the final analysis, must be determined by management. Determining acceptable impacts in financial terms and then working backward to determine risk levels may help facilitate an understanding by management. The information security manager should be aware that incident management also includes business continuity and disaster recovery planning (DRP). DRP generally comprises the plan to recover an IT processing facility or by business units to recover an operational facility. The recovery plan must be consistent with and support the overall IT plan of the organization. Overall, response management is equal to the combination of BCP, DRP, and continuity of business operations and incident response, although each part, depending on the complexity of the organization, does not necessarily have to be integrated into one single plan. To have a viable response management planning strategy, however, each must be consistent with the other. Review Manual Reference Page: pg. 264
  19. No matter how good controls may be, the risk of an incident cannot be completely eliminated. Accordingly, the information security manager should oversee the development of response and recovery plans to ensure that they are properly designed and implemented. These plans should, as described previously, be based on the BIA. Next, response and recovery strategies should be identified and validated and then approved by senior management. Once senior management approves these strategies, the information security manager should oversee the development of the response and recovery plans. During this process, response and recovery teams should be identified and team members mobilized. The plans must provide the teams guidance concerning the steps to be taken to recover business processes. Review Manual Reference Page: pgs. 264 - 265
  20. Recovery time objective (RTO) is defined as the amount of time allowed for the recovery of a business function or resource to a predefined operational level after a disaster occurs. Exceeding this time would mean organization survival would be threatened or the losses would exceed acceptable levels. RTOs are determined as a result of management deciding the level of acceptable impact as a result of the unavailability of information resources. Generally, the optimal RTO is the point where the ongoing cost of loss is equal to the cost of recovery. Review Manual Reference Page: pg. 265
  21. The following model proposed by Schultz, Brown and Longstaff in a University of California technical report “Responding to Computer Security Incidents: Guidelines for Incident Handling” (UCRL-ID-104689, July 23, 1990), presents the six- phase model of incident response including preparation, identification, containment, eradication, restoration and follow- up: • Preparation —This phase prepares an organization to develop an incident response plan prior to an incident. Sufficient preparation facilitates smooth execution. • Identification —This phase aims to verify if an incident has happened and find out more details about the incident. Reports on possible incidents may come from information systems, end users or other organizations. Not all reports are valid incidents, as they may be false alarms or may not qualify as an incident. • Containment —After an incident has been identified and confirmed, the IMT is activated and information from the incident handler is shared. The team will conduct a detailed assessment and contact the system owner or business manager of the affected information systems/assets to coordinate further action. The action taken in this phase is to limit the exposure. • Eradication —When containment measures have been deployed, it is time to determine the root cause of the incident and eradicate it. Eradication can be done in a number of ways: restoring backups to achieve a clean state of the system, removing the root cause, improving defenses and performing vulnerability analysis to find further potential damage from the same root cause. • Recovery —This phase ensures that affected systems or services are restored to a condition specified in the RPO. The time constraint up to this phase is documented in the RTO. • Lessons learned —At the end of the incident response process, a report should always be developed to share what has happened, what measures were taken and the results after the plan was executed. Part of the report should contain lessons learned that provide the IMT and other stakeholders valuable learning points of what could have been done better. These lessons should be developed into a plan to enhance the incident management capability and the documentation of the incident response plan. Review Manual Reference Page: pgs. 265 - 266
  22. • Preparation —This phase prepares an organization to develop an incident response plan prior to an incident. Sufficient preparation facilitates smooth execution. Activities in this phase include: – Establishing an approach to handle incidents – Establishing policy and warning banners in information systems to deter intruders and allow information collection – Establishing communication plan to stakeholders – Developing criteria on when to report incident to authorities – Developing a process to activate the incident management team – Establishing a secure location to execute the incident response plan – Ensuring equipment needed is available Review Manual Reference Page: pgs. 265 - 266
  23. • Identification —This phase aims to verify if an incident has happened and find out more details about the incident. Reports on possible incidents may come from information systems, end users or other organizations. Not all reports are valid incidents, as they may be false alarms or may not qualify as an incident. Activities in this phase include: – Assigning ownership of an incident or potential incident to an incident handler – Verifying that reports or events qualify as an incident – Establishing chain of custody during identification when handling potential evidence – Determining the severity of an incident and escalating it as necessary Review Manual Reference Page: pgs. 265 - 266
  24. • Containment —After an incident has been identified and confirmed, the IMT is activated and information from the incident handler is shared. The team will conduct a detailed assessment and contact the system owner or business manager of the affected information systems/assets to coordinate further action. The action taken in this phase is to limit the exposure. Activities in this phase include: – Activating the incident management/response team to contain the incident – Notifying appropriate stakeholders affected by the incident – Obtaining agreement on actions taken that may affect availability of a service or risks of the containment process – Getting the IT representative and relevant virtual team members involved to implement containment procedures – Obtaining and preserving evidence – Documenting and taking backups of actions from this phase onward – Controlling and managing communication to the public by the public relations team Review Manual Reference Page: pgs. 265 - 266
  25. • Eradication —When containment measures have been deployed, it is time to determine the root cause of the incident and eradicate it. Eradication can be done in a number of ways: restoring backups to achieve a clean state of the system, removing the root cause, improving defenses and performing vulnerability analysis to find further potential damage from the same root cause. Activities in this phase include: – Determining the signs and cause of incidents – Locating the most recent version of backups or alternative solutions – Removing the root cause. In the event of worm or virus infection, it can be removed by deploying appropriate patches and updated antivirus software. – Improving defenses by implementing protection techniques – Performing vulnerability analysis to find new vulnerabilities introduced by the root cause Review Manual Reference Page: pgs. 265 - 266
  26. • Recovery —This phase ensures that affected systems or services are restored to a condition specified in the RPO. The time constraint up to this phase is documented in the RTO. Activities in this phase include: – Restoring operations to normal – Validating that actions taken on restored systems were successful – Getting involvement of system owners to test the system – Facilitating system owners to declare normal operation Review Manual Reference Page: pgs. 265 - 266
  27. • Lessons learned —At the end of the incident response process, a report should always be developed to share what has happened, what measures were taken and the results after the plan was executed. Part of the report should contain lessons learned that provide the IMT and other stakeholders valuable learning points of what could have been done better. These lessons should be developed into a plan to enhance the incident management capability and the documentation of the incident response plan. Activities in this phase include: – Writing the incident report – Analyzing issues encountered during incident response efforts – Proposing improvement based on issues encountered – Presenting the report to relevant stakeholders Review Manual Reference Page: pgs. 265 - 266
  28. Content to Emphasize: Training the response teams is essential; the information security manager should develop event scenarios and test the response and recovery plans to ensure that team participants are familiar with their tasks and responsibilities. Through this process the teams will also identify the resources they require for response and recovery, providing the basis for equipping the teams with needed resources. An added value of training is detecting and modifying ambiguous procedures to achieve clarity and determining recovery resources that may not be adequate or effective. IMT members should undergo the following training program: • Induction to the IMT —The induction should provide the essential information required to be an effective IMT member. • Mentoring team members regarding roles, responsibilities and procedure —Existing IMT members can provide valuable knowledge to aid new members after induction. To facilitate effective mentoring, the buddy system can be used, pairing new members with experienced members. • On-the-job training —May serve to provide an understanding of company policies, standards, procedures, available tools and applications, acceptable code of conduct, etc. • Formal training —Team members may require formal training to attain an adequate level of competence necessary to support the overall incident management capability. Review Manual Reference Page: pg. 266
  29. Content to Emphasize: The information security manager must understand the basic processes required to recover operations from incidents such as DoS attacks, natural disasters and other potential disruption of business operations. Disaster recovery (DR) has traditionally been defined as the recovery of IT systems after disruptive events such as hurricanes and floods. Business recovery is defined as the recovery of the critical business processes necessary to continue or resume operations. Business recovery includes not only disaster recovery, but also all other required operational aspects. Review Manual Reference Page: pg. 266
  30. Content to Emphasize: Various strategies exist for recovering critical information resources. The most appropriate strategy is likely to be one that demonstrably addresses probable events with acceptable recovery times at a reasonable cost. Depending on the size and complexity of the organization and the state of recovery planning, the information security manager should understand that the development of an incident management and response plan is likely to be a difficult and expensive process that may take considerable time. It may require the development of several alternative strategies encompassing different capabilities and costs to be presented to management for a final decision. Each alternative must be sufficiently developed to provide an understanding of the trade-offs between scope, capabilities and cost. It may be prudent to consider outsourcing some or all of the needed capabilities and determine costs for the purpose of comparisons. Once the decision is made for which strategy best meets management’s objectives, it provides the basis for the development of detailed incident management and response plans. Review Manual Reference Page: pg. 267
  31. The plan must identify teams and define their assigned responsibilities in the event of an incident. To implement the strategies that have been developed for business recovery, key decision making, technical and end-user personnel to lead teams need to be designated and trained. Depending on the size of the business operation, the team may consist of a single person. The involvement of these teams depends on the level of the disruption of service and the types of assets lost, compromised, damaged or endangered. A matrix should be developed that indicates the correlation between the functions of the different teams. This will facilitate estimating the magnitude of the effort and activating the appropriate combination of teams. Examples of the kinds of teams usually needed include the: • The emergency action team —Designated fire wardens and “bucket crews” whose function is to deal with fires or other emergency response scenarios • Damage assessment team— Qualified individuals who assess the extent of damage to physical assets and make an initial determination regarding what is a complete loss vs. what is restorable or salvageable • Emergency management team —Responsible for coordinating the activities of all other recovery teams and handling key decision making • Relocation team —Responsible for coordinating the process of moving from the hot site to a new location or to the restored original location • Security team —Often called a computer security incident response team, it is responsible for monitoring the security of systems and communication links, containing any ongoing security threats, resolving any security issues that impede the expeditious recovery of the system(s), and assuring the proper installation and functioning of every security software package. Review Manual Reference Page: pgs. 269 - 270
  32. The recovery plan must also cover notification responsibilities and requirements. It should also include a directory of key decision-making personnel, information systems owners, end users and others required to initiate and carry out response efforts. This directory should also include multiple communication methods (telephone, cell phone, text, e-mail, etc). The directory should include at least the following individuals: • Representatives of equipment and software vendors • Contacts within companies that have been designated to provide supplies and equipment or services • Contacts at recovery facilities, including hot site representatives or predefined network communications rerouting services • Contacts at offsite media storage facilities and the contacts within the company who are authorized to retrieve media from the offsite facility • Insurance company agents • Contacts at human resources (HR) and/or contract personnel services • Law enforcement contacts Review Manual Reference Page: pg. 270
  33. The information security manager, helped by the recovery team’s organization, should implement periodic testing of response and recovery plans. Testing should include: • Developing test objectives • Executing the test • Evaluating the test • Developing recommendations to improve the effectiveness of testing processes as well as response and recovery plans • Implementing a follow-up process to ensure that the recommendations are implemented Review Manual Reference Pages: pg. 273
  34. Content to Emphasize: The information security manager should also implement a tracking process to ensure that any recommendations resulting from testing are implemented in a timely fashion. Personnel should be tasked with making any necessary changes. The information security manager needs to understand that testing recovery and response plans need to include infrastructure and critical applications. With today’s organizations’ heavy reliance on information technology, the information security manager is not only tasked with securing these systems during normal operations, but also during disaster events. Based on the risk assessment and business impact information, the information security manager can identify critical applications that the organization requires and the infrastructure needed to support them. To ensure that these are recovered in a timely fashion, the information security manager needs to perform appropriate recovery tests. Review Manual Reference Page: pgs. 273 - 274
  35. Review Manual Reference Page: pg. 274
  36. To ensure the response and recovery plans are executed as required, the plans need a facilitator or director to direct the tasks within the plans, oversee their execution, liaise with senior management and make decisions as necessary. The information security manager may or may not be the appropriate person to act as the recovery plan director or coordinator, but must be certain the role is assigned to someone who can perform this critical function. Developing appropriate response and recovery strategies as well as alternatives is an essential component in the overall process of executing the response and recovery plans. It will provide reasonable assurance that the organization can recover its key business functions in the event of a disruption and that it responds appropriately to a security-related incident. Review Manual Reference Page: pg. 275
  37. Having a good legal framework is important to provide options to the organization. The information security manager should develop data preservation procedures with the advice and assistance of legal counsel, the organization’s managers and knowledgeable law enforcement officials to assure the procedures provide sufficient guidance to IT and security staff. With the assistance of these specialized resources, the information security manager can develop procedures to handle security events in a manner that preserves evidence, ensures legally sufficient chain of custody, and is appropriate to meet business objectives. There are a few basic actions the information systems staff must understand. This includes doing nothing that could change/modify/contaminate potential or actual evidence. Trained forensics personnel can inspect computer systems that have been attacked, but if the organization’s personnel contaminate the information, the data may not be admissible in a court of law and/or the forensics staff may be unable to use the data in investigating an incident. Computer forensics, gathering and handling information and physical objects relevant to a security incident in a systematic manner so that they can be used as evidence in a court of law should usually be performed by a specially trained staff, third-party specialists, security incident response team or law enforcement officials. Review Manual Reference Pages: pg. 278
  38. Content to Emphasize: The information security manager should understand that any contamination of evidence following an intrusion could prevent an organization prosecuting a perpetrator and limit its options. In addition, the modification of data can inhibit computer forensic activity necessary to identify the perpetrator and all the changes and effects resulting from an attack. It may also preclude the possibility of identifying how the attack occurred, and how the security program should be changed and enhanced to reduce the risk of a similar attack in the future. The usual recommendation for a computer that has been compromised is to disconnect the power to maximize the preservation of evidence on the hard disk. This is not universally accepted as the best solution, and the information security manager will need to establish the most appropriate approach for their organization and train personnel in the appropriate procedures. Whichever procedure is used to secure a compromised system, trained personnel must use forensic tools to create a bit-by-bit copy of any evidence that may exist on hard drives and other media to ensure legal admissibility. To avoid the potential for alteration or destruction of incident-related data, any testing or data analysis should be conducted using this copy. The original should be given to a designated evidence custodian who must store it in a safe location. The original media must remain unchanged and a record of who has had custody of it—the chain of custody—must be maintained for the custody to be admissible in court. Review Manual Reference Page: pgs. 278 - 279
  39. Content to Emphasize: The information security manager should manage postevent reviews to learn from each incident and the resulting response and recovery effort and to use the information to improve the organization’s response and recovery procedures. The information security manager may perform postevent reviews to identify causes and corrective actions with the help of third-party specialists if detailed forensic skills are needed. Review Manual Reference Page: pg. 279
  40. The American National Standards Institute (ANSI) has awarded accreditation under ISO/IEC 17024 to the Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM) certification programs. ANSI reaccredited these ISACA programs in 2008. ANSI’s accreditation: Promotes the unique qualifications and expertise our certifications provide Protects the integrity of our certifications and provides legal defensibility Enhances consumer and public confidence in the certifications and the people who hold them Facilitates the mobility of certified individuals across borders or industries Accreditation by ANSI signifies that ISACA’s procedures meet ANSI’s essential requirements for openness, balance, consensus and due process. To maintain ANSI accreditation, certification bodies such as ISACA are required to consistently adhere to a set of requirements or procedures related to quality, openness and due process. The American National Standards Institute (ANSI) is a private, nonprofit organization that administers and coordinates the US voluntary standardization and conformity assessment system. Its mission is to enhance both the global competitiveness of US business and the US quality of life by promoting and facilitating voluntary consensus standards and conformity assessments systems, and safeguarding their integrity. Importantly, this accreditation and adherence to ISO/IEC 17024 is being used as an industry benchmark. For example, the U.S. Department of Defense (DoD), to ensure a knowledgeable and skilled workforce, has developed a directive that requires every full and part-time military service member, defense contractor, civilian and foreign employee with privileged access to a DoD system, regardless of job series or occupational specialty, to obtain a commercial certification credential that has been accredited by the American national Standards Institute (ANSI). With this accreditation, we anticipate that significant opportunities for CISMs will continue to open in the US, and we believe it will be a strong motivator for similar recognition by governmental entities outside the US.