Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

16:24
 
Share
 

Manage episode 505489372 series 3683458
Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A comprehensive approach to cybersecurity incident response, emphasizing the importance of a well-structured program and continuous improvement. It explores leadership qualities essential for effective teams, such as humility and decisiveness, and details how to organize and staff an incident response capability, including various team models and outsourcing considerations. A significant portion focuses on detection and identification of events, covering technologies like Data Loss Prevention (DLP), Endpoint Detection and Response (EDR), and Security Incident and Event Management (SIEM), while also highlighting the role of end-users. The text further discusses containment, eradication, and recovery strategies for different attack types, alongside the crucial aspect of continuous monitoring and post-incident reviews to refine the response process. Finally, it integrates the NIST Cybersecurity Framework as a foundational guide and illustrates real-world challenges through an incident response narrative, stressing the need for preplanning, strategy development, and a full-time commitment to maintaining security.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Cybersecurity-Incident-Response-Eradicate-Incidents/dp/1484238699?&linkCode=ll1&tag=cvthunderx-20&linkId=db464fd2e386461bac72a6855fd4ad0b&language=en_US&ref_=as_li_ss_tl
  continue reading

1000 episodes

Artwork
iconShare
 
Manage episode 505489372 series 3683458
Content provided by CyberSecurity Summary. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by CyberSecurity Summary or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
A comprehensive approach to cybersecurity incident response, emphasizing the importance of a well-structured program and continuous improvement. It explores leadership qualities essential for effective teams, such as humility and decisiveness, and details how to organize and staff an incident response capability, including various team models and outsourcing considerations. A significant portion focuses on detection and identification of events, covering technologies like Data Loss Prevention (DLP), Endpoint Detection and Response (EDR), and Security Incident and Event Management (SIEM), while also highlighting the role of end-users. The text further discusses containment, eradication, and recovery strategies for different attack types, alongside the crucial aspect of continuous monitoring and post-incident reviews to refine the response process. Finally, it integrates the NIST Cybersecurity Framework as a foundational guide and illustrates real-world challenges through an incident response narrative, stressing the need for preplanning, strategy development, and a full-time commitment to maintaining security.
You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary
Get the Book now from Amazon:
https://www.amazon.com/Cybersecurity-Incident-Response-Eradicate-Incidents/dp/1484238699?&linkCode=ll1&tag=cvthunderx-20&linkId=db464fd2e386461bac72a6855fd4ad0b&language=en_US&ref_=as_li_ss_tl
  continue reading

1000 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play