How to Get Started with Cybersecurity Incident Response
Shearwater’s Chief Technology Officer, Mark Hofman, shares his steps for building an Incident Response Plan to help you take control of a security incident.
Framed around the common and costly Business Email Compromise (BEC) attacks, Mark offers actionable tips on setting up an incident response process and validating your incident response plans.
You will learn about:
What defines an incident and why an incident response plan is crucial
Key elements required to set the scope and success factors of an incident response plan
How to assemble the incident response team, set up roles and delegate responsibilities
How to make sure your plan is current and will evolve over time
Your obligations under the Notifiable Data Breach scheme, privacy laws, and information security compliance requirements
If you’re interested in creating an incident response plan that protects your organisation, then this video is for you.