Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

3/22/2019
02:30 PM
Kelly Sheridan
Kelly Sheridan
Slideshows
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail

Inside Incident Response: 6 Key Tips to Keep in Mind

Experts share the prime window for detecting intruders, when to contact law enforcement, and what they wish they did differently after a breach.
4 of 7

Assign, Rehearse Response Roles
Twice a year, Hanson practices the incident response process for Code42 with all members of the team involved. It's essential to have a core response team: someone in charge of legal, someone in charge of the technical investigation, and someone who handles public relations.
The minute a member of the incident response team leaves, it's critical they are immediately replaced, she said. Whoever is the newest team member will have to be brought up to speed.
'The trick here is practice,' said Hanson, noting that many companies have a breach response plan but rarely go over it or bring in new people when certain staff leave. 'There's nothing worse than being interviewed by someone when your corporate well-being is on the line, and you might get litigated based on what you say,' she added.
(Image: Wavebreakmediamicro - stock.adobe.com)

Assign, Rehearse Response Roles

Twice a year, Hanson practices the incident response process for Code42 with all members of the team involved. It's essential to have a core response team: someone in charge of legal, someone in charge of the technical investigation, and someone who handles public relations.

The minute a member of the incident response team leaves, it's critical they are immediately replaced, she said. Whoever is the newest team member will have to be brought up to speed.

"The trick here is practice," said Hanson, noting that many companies have a breach response plan but rarely go over it or bring in new people when certain staff leave. "There's nothing worse than being interviewed by someone when your corporate well-being is on the line, and you might get litigated based on what you say," she added.

(Image: Wavebreakmediamicro stock.adobe.com)

4 of 7
Comment  | 
Print  | 
Comments
Threaded  |  Newest First  |  Oldest First
CharlieDoesThings
50%
50%
CharlieDoesThings,
User Rank: Apprentice
3/25/2019 | 10:22:21 AM
6 more tips I could use
Well done with the post, I really enjoyed the tips.
StephenGiderson
50%
50%
StephenGiderson,
User Rank: Strategist
4/26/2019 | 1:16:33 AM
Who should we help?
OF course bigger businesses are going to be better prepared when it comes to disaster and external attacks. But they are also more than capable of affording the ramifications of such a situation whereas the smaller guys will struggle. So who really needs the help?
How to Think Like a Hacker
Dr. Giovanni Vigna, Chief Technology Officer at Lastline,  10/10/2019
7 SMB Security Tips That Will Keep Your Company Safe
Steve Zurier, Contributing Writer,  10/11/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-17607
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php servername parameter.
CVE-2019-17608
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbname parameter.
CVE-2019-17609
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbusername parameter.
CVE-2019-17610
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php dbpassword parameter.
CVE-2019-17611
PUBLISHED: 2019-10-16
HongCMS 3.0.0 has XSS via the install/index.php tableprefix parameter.