Business Continuity
Sustaining operations during disruption
Sustaining operations during disruption
Sustaining operations during disruption
The paper trail for evidence handling
Order of Volatility and Data Collection Procedures
Types of Investigations in Cybersecurity
Investigating devices to uncover evidence
Act immediately, contain the situation
Types of Evidence in Cybersecurity
Monitoring is key to detecting signs of incidents
Full mitigation mode to control damage and loss
Summary of Incident Response Terminologies
Processes and tools used in incident response
Incident Response Models and Exercises
Reflect and Improve
NIST Definitions from 800-34 Revisions 1
Identification, Collection, Analysis, and Reporting
Preservation of Evidence
Restoring to normal operations
Security Orchestration, Automation, and Response
SPOF Analysis and IT Contingency Plans