Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Incident Response Team Episode

33:26
 
Share
 

Manage episode 498867335 series 3668135
Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

Our rapid response team had three specialized roles on it:

  • Duncan – Pen Testing
  • Eric – IT
  • Alan – Privacy

The first step in responding to this incident was discovery. This is part of the phase known as detection and identification. Duncan identified what type of data was taken and what methods were used.

Communication is a critical piece for incident response. Communicating with the coworkers who reported the incident, executive management to get context about the issue, technical personnel to know what controls are in place, etc.

The reason a privacy specialist was involved with the team was to analyze what kind of data was involved and what regulatory requirements might apply. This is important because it affects notification responsibilities.

Prepare

The best time for incident response is BEFORE an incident occurs. Prepare now by making decisions about how you’ll react WHEN an incident occurs. You can walk through a scenario today for what you’ll do if an employee takes data they shouldn’t.

Lessons Learned

  • What policies and procedures need to change?
  • What controls should be adjusted?
  • Are there areas where response time could have been different?
  • What training is needed?

Incident Response Recommendations and Considerations for Cybersecurity Risk Management – NIST 800-62r3

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf

SANS Incident Response Framework

https://www.sans.org/security-resources/glossary-of-terms/incident-response

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

  continue reading

10 episodes

Artwork
iconShare
 
Manage episode 498867335 series 3668135
Content provided by KirkpatrickPrice. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by KirkpatrickPrice or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

Our rapid response team had three specialized roles on it:

  • Duncan – Pen Testing
  • Eric – IT
  • Alan – Privacy

The first step in responding to this incident was discovery. This is part of the phase known as detection and identification. Duncan identified what type of data was taken and what methods were used.

Communication is a critical piece for incident response. Communicating with the coworkers who reported the incident, executive management to get context about the issue, technical personnel to know what controls are in place, etc.

The reason a privacy specialist was involved with the team was to analyze what kind of data was involved and what regulatory requirements might apply. This is important because it affects notification responsibilities.

Prepare

The best time for incident response is BEFORE an incident occurs. Prepare now by making decisions about how you’ll react WHEN an incident occurs. You can walk through a scenario today for what you’ll do if an employee takes data they shouldn’t.

Lessons Learned

  • What policies and procedures need to change?
  • What controls should be adjusted?
  • Are there areas where response time could have been different?
  • What training is needed?

Incident Response Recommendations and Considerations for Cybersecurity Risk Management – NIST 800-62r3

https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r3.pdf

SANS Incident Response Framework

https://www.sans.org/security-resources/glossary-of-terms/incident-response

KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission

  continue reading

10 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play