Hot Type

Formulate a more effective information security incident response plan

In recent years, a constant stream of reports has detailed how some of the largest enterprises in the world have been breached. From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their infosec operations.

ABOUT THE BOOK

Learn more about N.K. McCarthy's book, The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, published by McGraw Hill Professional.

This means that enterprises should develop an information security incident response plan well in advance of a breach. Of course, planning an incident response from scratch can be a daunting task. From being compliant with various regulations to getting a sign-off from management, every aspect of an organization will need to be involved in order to form an effective plan. Luckily, enterprises can now draw from some battle-tested plans.

In this SearchSecurity.com Hot Type podcast, Neal McCarthy, CISSP and author of the book The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, available from McGraw Hill, discusses some real-world examples of incident response plans that he has implemented and maintained at a Fortune 100 company. The plans have been audited by PCI DSS and executed several times in the field. McCarthy also provides some of the theory behind his example plans so enterprises can adapt the plans to their own needs. Some of the larger concepts in modern information security are also discussed, including the idea of containment and the change in mindset that security experts need to make to defend against evolving threats. For enterprises that need to form a more effective information security incident response plan, McCarthy provides all of the needed tools to get them up to speed.

 


This was first published in September 2012

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: