Invite to discuss

Want posts & news about #incident response team on your wall?

Sign Up

incident response team

Posts
9
Experts
7
Views
3.8K
Shares
36
Upvotes
141

Posts

Gary Hayslip

CISO MISSION ORDER 1.0

To: All technology professionals, transitioning veterans, college students, second career searchers and the technically curious. From: Small Businesses, Corporations, Non-Profits, Municipalities, and State & Federal Governments Situation: In today’s dynamic cybersecurity landscape, organizations executive leadership teams consistently assess the value of their company’s securit… Read more
3
Start the discussion...
Graham Joseph Penrose

Does legislation stifle innovation?

Does legislation stifle innovation? No. Why? Because it legislates in "catch up mode" mostly and on those rare occasions when the legislators do see something coming in advance (examples? I don't have any actually) - then they fail to implement the legislation or put in place checks and balances to monitor compliance. Legislators are better at legislating for the abuse of datRead more
3
5
Join the discussion...
mesbernard@gmail.com
When you consider the fact that legislation usually is created to control risks associated with a "leap frog" innovation event then the obvious answer is "YES!". Legislation goes on to stifle the ongoing creative process that led to the immediate evolution. A follow up question might be, "could legislation be designed to encourage future innovation?" … Read more
1
David Froud
My cynicism goes nowhere near as deep as yours, perhaps because I see this from an information security perspective, not so much a privacy/human right one, but I absolutely agree with "catch-up mode". What choice do they have? Vendors create something new and amazing, everyone want it, and by then it's too late to take it away. Governments regulate after the fact, and can onl… Read more
NewsWatcher

The Cost of a Data Breach Report 2017 by Ponemon Institute and IBM

I just downloaded the report for this year - the 2017 Cost of Data Breach Study‍ by Ponemon Institute and IBM. Whereas the verizon dbir report‍ allegedly is on its last legs, the Cost of Data Breach Study seems to be going really strong and has a ton of interesting content, it's a highly recommended read. The study has been conducted in 11 countries plus the Middle East and ASE… Read more
1
2
Join the discussion...
Graham Joseph Penrose
NewsWatcher‍ a message from M Van der Poorten @michelvdp Cognitive Business Strategist @ IBM focused on Financial Services regarding your summary of this report: "Thanks for your detailed summary of the report. I saw your question mark on enterprise-wide encryption. Indeed @IBM is working on this."
1
1
Cristian Driga

NIS Directive 1148/2016 summary in a sigle slide

The Directive on security of network and information systems (NIS Directive) provides legal measures to boost the overall level of cybersecurity in the EU by ensuring: Member States preparedness by requiring them to be appropriately equipped, e.g. via a Computer Security Incident Response Team (CSIRT) and a competent national NIS authority; cooperation among all the Member States, by setting up a… Read more
5
3
Join the discussion...
Claus Cramon Houmann
Useful enough to be a resource, short but succinct.
1
2
Joseph Martin

Incident Response Team - How and what

This article is an effort to help you understand the basics of what it takes to build an incident response team that is effective, controlled and continuously improving. Reviews welcome http://blogs.alephtavtech.com/network/an-eagle-eyed-security-incident-response-team-what-it-takes/ incident responseincident managementSIEMenterprise securityforensics‍… Read more
35
Start the discussion...
Peerlyst

Hack.lu 2016 Fraud detection and forensics on telco networks

hacklu‍ 2016 fraud detection‍ and forensics‍ on telco networks‍ The presentation by Vladimir Kropotov and Dmitry Kurbatov.Telecom networks have always been targets for those looking to obtain services for free or at the expense of other subscribers. In this presentation, we will describe new fraud techniques and attacks that use SS7 vulnerabilities affect… Read more
Start the discussion...