Ten Rules for the Cyber Incident Responder

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Ten Rules for the Cyber Incident Responder-6 Next

Never release confidential information

Loose lips sink ships. Do not talk about what work you are doing to anyone who has no need to know – releasing information about an incident can tipoff adversaries and move the cyber event into a less controlled situation. Additionally, releasing information to the public arena can hurt an organization’s reputation and brand.

For the past 15 years, Ryan Vela, regional director of Cybersecurity Services at General Dynamics Fidelis Cybersecurity Solutions, has been involved in cyber incident response in both the public and private sectors. While serving as follower, leader, coordinator, liaison, consultant, and advisor on countless small, medium, and large incidents, he has come to learn that there is a small set of rules that apply to every single incident response and to every single person serving as part of an incident response team. If you are a cyber incident responder, then you may know all of this already. However, he will explain why these 10 rules are necessary.

The Incident Responder’s 10 Rules

1.    Do no harm.

2.    Always act ethically.

3.    Always act and present yourself professionally.

4.    Always maintain operational security.

5.    Never release confidential information.

6.    Always take notes.

7.    Always gather and analyze all facts before reporting a conclusion.

8.    Always pursue first-hand information.

9.    Never assume you have all of the data.

10.    Do not fear the unknown.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.