Seven Key Components to Start Your Incident Response Plan

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9
Previous Next

Click through for seven key components organizations need to create an effective incident response plan, as identified by Ken Silva, president, ManTech Cyber Solutions International.

Today, organizations are overwhelmed with the volume, variety and complexity of cyber attacks. They are equally overwhelmed with the variety and complexity of cyber security solutions, particularly the overlapping capabilities offered by vendors with a "me too" attitude. This is flagrantly evident with "incident response tools;" every vendor wants to be their customer's incident response solution.

The cybersecurity incident response cannot be a simple extension or an after-thought. It's a discipline that organizations have tried to hone in on since the first malware was discovered, and it requires a thoughtful, evolutionary and comprehensive approach commensurate with the changing cyber threat landscape. Any tool that purports to be an incident response tool must seamlessly integrate with an organization's incident response strategy, the core of which includes an incident response policy, plan, procedures and service levels. Collectively, this is called the incident response program.

Regardless of the size of an enterprise or its industry, organizations must create and implement an incident response program to effectively and confidently respond to the current and emerging cyber threats. More often than not, companies make simple mistakes in developing and implementing these programs largely because they are focused on the day-to-day, versus a comprehensive strategy to combat persistent cyber threats. Ken Silva, president of cyber strategy at ManTech Cyber Solutions, offers seven key elements required to establish a robust, evolutionary and durable incident response program that delivers results.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

AlienVaultHowToHackPOS0x From a Hacker's Perspective: How to Breach a Point-of-Sale System

Electronic payments have started to outnumber cash transactions, and hackers have taken notice -- with an increased number of point-of-sale (POS) system breaches making the headlines. ...  More >>

Misc43-190x128 Fifty Start-Ups Disrupting Their Industries

Dell recently announced the new Founders 50 Fall 2014 cohort, which for the first time includes a global contingent representing five countries – the U.S., UK, Canada, France and the Netherlands. ...  More >>

WinMagicHigherEdSecurity0x Data Protection: Five Challenges Facing Today's Educational Institutions

Given the amount of sensitive information colleges and universities store, including student records, coursework and research, it's imperative that they readdress their current security strategies. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.