Operations

11/8/2017
03:56 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

FIRST Announces Incident Response Training for Policymakers

The Forum of Incident Response and Security Teams announces a training session on cyber security incident response for policymakers, policy analysts and government officials.

Nov. 8, 2017 – The Forum of Incident Response and Security Teams (FIRST) today announced it will be organizing a training for policymakers on cyber security incident response, in conjunction with the Internet Governance Forum (IGF) in Geneva, December 18th 2017.

Since 1989, FIRST has organized conferences, trainings and workshops for the technical incident response community, enabling them to share experiences and improve their capability at dealing with major security incidents. With the new course, FIRST will now engage with a new audience, policy analysts working on cyber security, who often have to make decisions that will impact computer security incident response teams (CSIRT).

FIRST Board member Maarten Van Horenbeeck, who coordinates the training, states: “FIRST has historically provided training to its own community, that of technical incident responders and security teams. This is, and will continue to be the focus of our work.

“However, with this new training we will provide the wider context of incident response to policymakers and policy analysts working on cyber security issues. This will support them in making optimal policy decisions, enabling our member teams to be more effective dealing with major cross-border security incidents.

“While for now this is a single event, we will release our materials under a creative commons license, so others in the community can reuse them, and we can maximize their impact.”

The training will cover topics such as how to fit incident response into a national cyber security strategy, the history of CSIRT teams, how they cooperate across international boundaries and most importantly, how these organizations develop trust relationships. In addition, the training will walk through a case study to truly help policy analysts understand how different organizations in the internet community deal with real life major incidents.

The instructors providing the training are Michael Hausding, Serge Droz and Maarten Van Horenbeeck, and the event will take place at the headquarters of the International Telecommunications Union (ITU) in Geneva on Monday, December 18th 2017.

Interested parties can contact the FIRST secretariat via [email protected] with further questions, or sign up for the training at https://www.first.org/events/training/geneva2017/.


About FIRST

Founded in 1990, the Forum of Incident Response and Security Teams (FIRST) consists of internet emergency response teams from more than 360 corporations, government bodies, universities and other institutions across 78 countries in the Americas, Asia, Europe, Africa, and Oceania. It promotes cooperation among computer security incident response teams. For more information, visit: https://www.first.org.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Higher Education: 15 Books to Help Cybersecurity Pros Be Better
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/12/2018
'PowerSnitch' Hacks Androids via Power Banks
Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/8/2018
How Well Is Your Organization Investing Its Cybersecurity Dollars?
Jack Jones, Chairman, FAIR Institute,  12/11/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-1817
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 150021.
CVE-2018-1818
PUBLISHED: 2018-12-13
IBM Security Guardium 10 and 10.5 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 150022.
CVE-2018-1821
PUBLISHED: 2018-12-13
IBM Operational Decision Management 8.5, 8.6, 8.7, 8.8, and 8.9 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 150170.
CVE-2018-1886
PUBLISHED: 2018-12-13
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 152021.
CVE-2018-1887
PUBLISHED: 2018-12-13
IBM Security Access Manager Appliance 9.0.1.0, 9.0.2.0, 9.0.3.0, 9.0.4.0, and 9.0.5.0 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force...