Five Considerations for Building an Effective Incident Response Framework

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Five Considerations for Building an Effective Incident Response Framework-2 Next

Prevent, detect, investigate and respond

A traditional incident response cycle has four steps to remove the attackers' advantage: prevent, detect, investigate and respond. Having a framework in place ahead of an incident will help streamline this cycle. This will allow companies to spend less time learning about the threat and more time overcoming it.

Although news headlines are consistently reporting that cyber threats are evolving into more targeted, sophisticated attacks, it may come as a surprise to some organizations that 75 percent of the security breaches that occur are opportunistic. According to a recent Verizon data breach report, these attacks are not targeted at any specific individual or organization.

For organizations that fall victim to a security breach, there tends to be a large focus on reducing the breach buzz to repair earned reputation and rebuild customer trust. For IT teams within the company, this means the noise and buzz must be reduced by cutting down on the time and resources it takes to repair the network.

Building an effective incident response program is essential for organizations because it enables them to not only contain a single incident, but it also helps to start modeling the techniques of an attack. Incident response stems from an approach that detects and enumerates the steps taken by an attacker to compromise a system. This information is used by the incident response team, which drives future incident response activities.

In this slideshow, AlienVault, provider of Unified Security Management™ solutions and crowd-sourced threat intelligence, offers five considerations for building an effective framework for incident response in order to remediate the threat.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Compliance4-190x128 GRC Programs: Building the Business Case for Value

Experience shows that organizations that manage GRC as an integrated program — involving people, processes and technologies — are more successful in delivering value to their organizations ...  More >>

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.