resolution and best practices v2 · oce/ars d/tr oinn-l,' j'su top threat destinations -...

24

Upload: others

Post on 25-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 2: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc

https://youtu.be/X08wgodFgXw

Page 3: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 4: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 5: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 6: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 7: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 8: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 9: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 10: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 11: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 12: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 13: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 14: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 15: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 16: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 17: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 18: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 19: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 20: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 21: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc
Page 22: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc

Membership of the Incident Response Team

22

• Incident Response Team leader/coordinator

• Privacy Officer

• Legal

• Risk Management

• Others as appropriate– Information security– Law Enforcement– HR, employee relations, patient relations– Public relations / Marketing– Outside legal counsel

Page 23: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc

Simplified Incident Response Strategy

How do we respond to a cyber security incident?

1. DISCOVERY

0. PREVENTION

2. EVALUATION & TRIAGE 3. MANAGING THE SHORT TERM CRISIS

4. LONG TERM RESPONSEMANAGEMENT

• Forensic Investigation• Containment• Legal Review• Recovery

• Incident Response Team• Incident Analysis – Assess the Impact

MINOR: Detect & ResolveMAJOR: Escalate through Incident Response Plan

• Report Discovery

• Immediate Response Planning• Communications, PR, Crisis Management

Recovery

• Long Term Recovery Planning: Legal, Reputational, Media

• Customer Communications• Recommend Improvements

Page 24: Resolution and best practices v2 · Oce/ars D/tr oinn-l,' J'SU Top Threat Destinations - Last 1 Week (Feb 19 2019 - Feb . Application Proxy.HTTP itrix.Receiver a Tea mViewer tàGoToMypc