Overview of the. Computer Security Incident Response Plan. Process Resource Center

Similar documents
INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Incident Response Services

End to End Visualization of. Expectations, and Dependencies

Incident Response. Is Your CSIRT Program Ready for the 21 st Century?

Certified Information Security Manager (CISM) Course Overview

Nebraska CERT Conference

Testing for cyber resilience tools & techniques for adversary simulation and improved defense

Vulnerability Assessments and Penetration Testing

Cyber Resilience. Think18. Felicity March IBM Corporation

Cybersecurity Auditing in an Unsecure World

Role of BC / DR in CISRP. Ramesh Warrier Director ebrp Solutions

NW NATURAL CYBER SECURITY 2016.JUNE.16

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Medical Device Cybersecurity: FDA Perspective

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Be Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid

Gujarat Forensic Sciences University

Function Category Subcategory Implemented? Responsible Metric Value Assesed Audit Comments

SECURITY INCIDENT MANAGEMENT. Solution Primer. Jenn Black. Senior Research AnalystSolutions Research and Development Office of the CISO, Optiv

Chapter 4 After Incident Detection

MITIGATE CYBER ATTACK RISK

Ansible for Incident Response

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Cyber Threat Intelligence Standards - A high-level overview

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Effective Strategies for Managing Cybersecurity Risks

Cyber Threat Intelligence Debbie Janeczek May 24, 2017

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Security Incident Management in Microsoft Dynamics 365

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Heavy Vehicle Cyber Security Bulletin

Cybersecurity for Health Care Providers

Changing face of endpoint security

CompTIA CSA+ Cybersecurity Analyst

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Ingram Micro Cyber Security Portfolio

Security Hygiene. Be in a defensible position. Be cyber resilient. November 8 th, 2017

Fabrizio Patriarca. Come creare valore dalla GDPR

Business Continuity Planning

Real-world Practices for Incident Response Feb 2017 Keyaan Williams Sr. Consultant

CYBERSECURITY MATURITY ASSESSMENT

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Top 20 Critical Security Controls (CSC) for Effective Cyber Defense. Christian Espinosa Alpine Security

Defining Computer Security Incident Response Teams

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

BPS Suite and the OCEG Capability Model. Mapping the OCEG Capability Model to the BPS Suite s product capability.

Bradford J. Willke. 19 September 2007

Bringing Cybersecurity to the Boardroom Bret Arsenault

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

SECURITY OPERATION CENTER - Models, Strategies and development - By Ali Mohammadi Desember 12,13, 2017

ICS Breach, what to do after oh no, frameworks and issues of IM/IT. Dr. Samuel Liles

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

The Mechanics of Cyber Threat Information Sharing

Cyber Risks in the Boardroom Conference

Sage Data Security Services Directory

CompTIA Cybersecurity Analyst+

CCISO Blueprint v1. EC-Council

Standard Development Timeline

4/13/2018. Certified Analyst Program Infosheet

CompTIA Cybersecurity Analyst+ (CySA+) Course Outline. CompTIA Cybersecurity Analyst+ (CySA+) 17 Sep 2018

NEXT GENERATION SECURITY OPERATIONS CENTER

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Are we breached? Deloitte's Cyber Threat Hunting

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

Case Study: The Evolution of EMC s Product Security Office. Dan Reddy, CISSP, CSSLP EMC Product Security Office

Designing and Building a Cybersecurity Program

K12 Cybersecurity Roadmap

Building and Testing an Effective Incident Response Plan

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Choosing the Right Cybersecurity Assessment Tool Michelle Misko, TraceSecurity Product Specialist

Cyber Incident Management Planning Guide. For IIROC Dealer Members

Ensuring System Protection throughout the Operational Lifecycle

Loss of Control Center Functionality: EOP-008-1, CIP-008-3, CIP September 30, 2014

Quality Assurance and IT Risk Management

2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report

Technology Risk Management and Information Security A Practical Workshop

Cyber Security. Building and assuring defence in depth

The Rise of the Purple Team

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

MANAGEMENT OF INFORMATION SECURITY INCIDENTS

12/05/2017. Geneva ServiceNow Security Management

Improving Cybersecurity through the use of the Cybersecurity Framework

The Resilient Incident Response Platform

Adaptive & Unified Approach to Risk Management and Compliance via CCF

INFORMATION ASSURANCE DIRECTORATE

Cybersecurity: Incident Response Short

FROM SIEM TO SOC: CROSSING THE CYBERSECURITY CHASM

Transcription:

Overview of the Computer Security Incident Response Plan Process Resource Center

Mobilized CSIRP: Visually Intuitive, Accurate, Complete, Succinct Content Available On-the-Go Process Resource Centers: Customized Web Frameworks that Place CSIRP Policies, Processes, and Resources at the Fingertips of All Stakeholders When and How They Need It Visually Illustrates the Incident Response Plan in a Fashion that Enables All Stakeholders to Quickly Get on the Same Page Includes dynamic links and navigation to: Segmented visually intuitive workflows and response protocols Clearly defined roles and responsibilities, contacts, glossaries, forms, websites, videos and other resources as needed Links to applications and required information sources Centralized, Accessible via Desktops, Laptops, Tablets, and Mobile Phones HTML Version Can Run Entirely from a Jump-Kit Laptop and Mobile Phone if Network is Unavailable

CSIRP Process Resource Center for the NIST SP 800-61 R2 Incident Response Lifecycle Widely Referenced Incident Response Lifecycle Extensive Availability of Supportive Authoritative Referenceable Sources

NIST SP 800-61 R2 Community CSIRP Process Resource Center Home Page

Customized Web-Based Computer Security Incident Response Plan (CSIRP) Visually Intuitive Navigation Centralized Access to Supporting Resources NIST SP 800-53, 83, 83r2, 84, 184, 86, SANS, CERT, US & ICS-CERT, ISAC, MITRE, Specific Vendor Best Practices and more Each phase contains relevant intuitive workflows, supporting reference material where they apply within the process, and end-to-end accountability Reference center provides additional resources like threat playbooks and links to sites that provide malware remediation assistance

Home Page of CSIRP Process Resource Center Expanded Intent & Key Definitions

CSIRP Home Page Linked Document CSIRP Web Framework Overview

CSIRP 1.0 Preparation Preparation is about: Establishing and training the incident response team Proactively planning specific responses for the likely attacks the organization may face Acquiring the necessary incident response tools and resources Preparing the team to effectively react within minutes of unfamiliar attacks Testing plans and preparedness Continuously improving the incident response posture with lessons learned, industry updates, and reconnaissance

1.1 Create Computer Security Incident Response Team Charter (CSIRT) CSIRT Charter Establishes written management commitment to the CSIRP Defines goals, scope, levels of authority, roles, and responsibilities

Step 1.4: Create Response Plans for Incident Types Defined in Step 1.2, the Compliance & Threat Requirements Library

CSIRP 2.0 Monitor, Detection, & Analysis Monitor, Detection, & Analysis: The Monitor function was added to Detection and Analysis Monitor, Detection, & Analysis is about recognizing, receiving, analyzing and classifying all cybersecurity events and determining which are actual incidents vs. security or maintenance events Prioritizing the handling of incidents Event escalation path alternatives

2.1 Monitor and Detection

2.1 Monitor and Detection

2.2 Analysis

Fingertip Access to SOPs and Best Practices When Required Logically in the Plan

CSIRP 3.0 Containment, Eradication, & Recovery Containment, Eradication, & Recovery is about: Isolating the attacked system(s) Quickly and effectively determining the appropriate containment method Stopping the damage to the infected host(s) Tracking down other system infections and remedying them Ensuring the attack is fully remedied Bringing functionality back to normal Monitoring to ensure there are no lingering components of the attack

3.1 Containment, Eradication, & Recovery

CSIRP 4.0 Post-Incident Activity Post-Incident Activity is about Conducting robust assessments of lessons learned Ensuring the appropriate actions are taken to prevent recurrence of the vulnerability exploit Conducting forensics to aid understanding and remedy the vulnerability, the exploit, and to support possible legal actions

4.0 Post-Incident Activities

4.0 Post-Incident Activities

Reference Center

Library Contains Integrated Full Document for Regulatory and Audit Requirements

CSIRP Management Contacts

Visual End-to-End Total Accountability SIPOC Combined with RACI Eliminate Silos

Designed to Adapt to Desktops, Laptops, Tablet, and Mobile Phones

Adapt to Any Compliance Standards

Process Management Contact Contact: Henry Draughon Process Delivery Systems (972) 980-9041 hdraughon@processdeliverysystems.com www.processdeliverysystems.com Manage the Forest and the Trees Bridging the Gap Between Operations and Strategy