WhatIs definition: Incident response plan

Information Security Incident Response-Detection and Analysis

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Linux Malware Incident Response

    In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation. 

  • Using SIM for threat monitoring

    From a security perspective, it is challenging to keep ahead of the constantly evolving enterprise threat landscape. Security information and event management (SIEM) systems, however, can be a vital component of an enterprise’s threat mitigation arse... 

  • Quiz: Potential pitfalls in DNSSEC deployments

    Test your knowledge of DNSSEC deployments in this five-question quiz. 

  • Spotlight article: Domain 9, Physical Security

    Information security depends on the security and management of the physical space in which computer systems operate. Domain 9 of the Common Body of Knowledge addresses the challenges of securing the physical space, its systems and the people who work... 

  • Endpoint Security

    Read an excerpt from the book, Endpoint Security. In Chapter 3, "Something is Missing," author Mark S. Kadrich reveals a new way of modeling the network. 

  • Business continuity planning standards and guidelines

    An excerpt from Chapter 1: Contingency and Continuity Planning of "Business Continuity and Disaster Recovery for InfoSec Managers," by John W. Rittinghouse and James F. Ransome. 

  • Privacy Breach Impact Calculator

    How much would a customer privacy breach impact your business? This calculator by information security and privacy expert Rebecca Herold, CISSP, CISM, provides an example of some of the items an organization should consider when estimating the potent... 

  • Incident response process brings ROI and peace of mind

    In this excerpt of Chapter 2 from ISACA's Cybercrime: Incident Response and Digital Forensics, author Robert Schperberg looks at the benefits of instituting an incident response process. 

  • Lesson/Domain 7 -- Security School: Training for CISSP Certification

    Security School webcasts are focused on CISSP training. Each lesson corresponds to a specific domain in the CISSP exam's "Common Body of Knowledge." 

  • Summer security quiz: Are you ready to go on vacation?

    Take this short quiz to find out if you're really ready for the worst-case scenario.