In recent years, a constant stream of reports has detailed how some of the largest enterprises in the world have been breached. From political hacktivists to international cybercrime organizations, enterprise security has been under a barrage of attacks that run the gamut of complexity. Security breaches now seem inevitable even at organizations that invest heavily in their infosec operations.
This means that enterprises should develop an information security incident response plan well in advance of a breach. Of course, planning an incident response from scratch can be a daunting task. From being compliant with various regulations to getting a sign-off from management, every aspect of an organization will need to be involved in order to form an effective plan. Luckily, enterprises can now draw from some battle-tested plans.
About the book
Learn more about N.K. McCarthy's book, The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, published by McGraw Hill Professional.
In this SearchSecurity.com Hot Type podcast, Neal McCarthy, CISSP and author of the book The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk, available from McGraw Hill, discusses some real-world examples of incident response plans that he has implemented and maintained at a Fortune 100 company. The plans have been audited by PCI DSS and executed several times in the field. McCarthy also provides some of the theory behind his example plans so enterprises can adapt the plans to their own needs. Some of the larger concepts in modern information security are also discussed, including the idea of containment and the change in mindset that security experts need to make to defend against evolving threats. For enterprises that need to form a more effective information security incident response plan, McCarthy provides all of the needed tools to get them up to speed.