SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Effective Incident
A simple, easy to use, online, B2B procurement
 portal for purchasing products and services to
  identify, minimise and manage the security
             threat to business data.
               www.riskfactory.com
Overview

 •   Who cares?
 •   Why care?
 •   Success definition
 •   Policy & preparation work
 •   Procedures & forms
 •   Tools & training
 •   Incident database
 •   Reviews & measurements
Who Cares?

• Specifically? Name these stakeholders now
• Eliminate finger pointing potential after
• Establish Incident Response Team
  – List stakeholders roles & responsibilities
  – Contact details
  – Team mission statement
  – Post / Publish / Preach!
Why Care?

•   Because incidents = lost cash £
•   Iceberg tip theory
•   Timely response = minimized loss
•   Determine exactly who, what, when, why & how
•   Inform other departments of findings
•   Prevention & preparation for future
•   Mitigate risk & liability
•   Apprehend & prosecute
Define Success

Limit damage caused by incident
Minimize and/ or recover financial losses
Minimize downtime
Technological recovery
Minimize image damage
Minimize personal losses
Enable resolution of incident
Expunge virus/intruder
Improve security
Disciplinary action (solid evidence is key)
Prosecution
Response Team

Require wide range of technical skills
Dedicated response staff
Team makeup = skilled in applicable technology
Ad hoc team of existing sys admins
Multisite teams?
Additional duties = additional pay…
Policy & Preparation

Policy: “What do you do”?
Definition = critical.
Must be comprehensive
Define do’s and don’t
Deviations are incidents
Define level of incidents
Define incident response
Keep it simple
Write it down
Management sign off
Ramifications of Going
Solo
If you don’t define an incident = it never happens


Insufficient skills = Failure
Insufficient staff = Failure
Insufficient tools = Failure
Insufficient prep = Failure


Scapegoat….
Elements a Plan

 • Incident definition (Major vs. Minor)
 • Outline response for each type of incident
 • Reporting Process (Response Team
   Notification)
 • Containment Process
 • Eradication Process
 • Restoration
 • Follow-up Process
 • Reporting
Preparation:

Do you know where your data is?
Workstations
Servers (e-mail, databases)
Log files (there are many of them)
Network traffic (be careful about privacy)
Backups (can you find what you need?)
Are you prepared to preserve evidence?
Hard drives, software, spare hardware
Incident Response Process

•   Initial observation, report, or question
•   Assessment of severity and worth
•   Physical assessment
•   Preserve data on target systems
•   Network assessment
•   Preserve related evidence on network
•   Develop response/investigative strategy
•   Crime analysis
•   Conclusions and reports
Procedures and Forms
Incident numbering system
CERT# 2003032201
Communication procedure
Who to notify under what circumstances
Encrypted e-mail versus phone/pager
Procedures for each incident type
Virus, DoS, intrusion, telephone system
Sexual harassment, threats
Forms to ensure consistency
Document incident details
Evidence collection and documentation
Procedures: Evidence
Do you have authorization?
Employee consent
Search warrant
Involve human resources & attorneys
Admissibility
Document all actions (chain of custody)
Evidence originated from its purported source
Evidence was not altered during/after collection
Associated information is accurate (e.g. dates)
To shutdown or not to shutdown?
Sample Procedure Outline

When incident initially reported:
 Remote information gathering
 Preserve evidence on network
Collecting volatile data
  Step by step with tools and examples
Image hard drives
 Step by step with tools and examples
Restore and secure systems
 Backup data, reformat drive, rebuild, etc.
Communicate to community
Documentation: Forms
Expense and time logs:
dates and times working on incidents, including time to recover systems,
  helps calculate cost of damage
Incident response actions taken and when:
  telephone conversations
  helps explain incident response years later
Employees questioned and involved:
  everyone involved may be required to testify
Evidence inventory:
  helps locate evidence later
Forms: Evidence Collection

•   Memory aide, not just extra paperwork
•   Incident number (#2003032201)
•   Authorization
•   Who collected evidence & when
•   Where the evidence was located
•   Details of computer systems involved
•   How the evidence was collected
•   File names, sizes, hash values
•   Additional notes
Training

Understand the technology
   • Hardware components
   • System operation and security
   • Network traffic
Train personal in evidence handling
   • Do you really care about this?
Train personnel to use tools
   • Media analysis
   • Log analysis
   • Network exploration (nmap, Nessus, scripts)
   • Traffic analysis
Response & Measurement

•   Deploy incident response team (procedures!)
•   Decide whether or not to collect volatile data
•   Take systems offline for forensic analysis
•   Probe and monitor network
•   Interview individuals
•   Document everything
•   Correlate data from multiple sources
•   Communicate with legal counsel and police
26 Dover Street
         London
    United Kingdom
  +44 (0)20 3170 8955
+44 (0)20 3008 6011 (fax)

Weitere ähnliche Inhalte

Was ist angesagt?

Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidentsguest6fd3c2f9
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017zapp0
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskAlienVault
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramSasha Nunke
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksTripwire
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowkCura_Relativity
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security ContinuumMartin Hingley
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachFlaskdata.io
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...360 BSI
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightResilient Systems
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security lalithambiga kamaraj
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency SolutionsAnthony Dials
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorAnton Chuvakin
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …Andris Soroka
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Bossrbrockway
 

Was ist angesagt? (19)

Events Management or How to Survive Security Incidents
Events Management or How to Survive Security IncidentsEvents Management or How to Survive Security Incidents
Events Management or How to Survive Security Incidents
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Mitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security AttacksMitigating Risk from Cyber Security Attacks
Mitigating Risk from Cyber Security Attacks
 
Cyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to KnowCyber Risk in e-Discovery: What You Need to Know
Cyber Risk in e-Discovery: What You Need to Know
 
CISSP Chapter 1 Risk Management
CISSP Chapter 1  Risk ManagementCISSP Chapter 1  Risk Management
CISSP Chapter 1 Risk Management
 
The Datacenter Security Continuum
The Datacenter Security ContinuumThe Datacenter Security Continuum
The Datacenter Security Continuum
 
Data Security Metricsa Value Based Approach
Data Security Metricsa Value Based ApproachData Security Metricsa Value Based Approach
Data Security Metricsa Value Based Approach
 
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
Business Continuity & Disaster Recovery Planning 02 - 04 December 2013 Kuala ...
 
Incident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It RightIncident Response: Don't Mess It Up, Here's How To Get It Right
Incident Response: Don't Mess It Up, Here's How To Get It Right
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
Network Security: Physical security
Network Security: Physical security Network Security: Physical security
Network Security: Physical security
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
What Every Organization Should Log And Monitor
What Every Organization Should Log And MonitorWhat Every Organization Should Log And Monitor
What Every Organization Should Log And Monitor
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Enterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A BossEnterprise Class Vulnerability Management Like A Boss
Enterprise Class Vulnerability Management Like A Boss
 

Andere mochten auch

Gsm based road vehicle accident report system using mems sensor
Gsm based road vehicle accident report system using mems sensor  Gsm based road vehicle accident report system using mems sensor
Gsm based road vehicle accident report system using mems sensor Rohit Sinha
 
Process Steps
Process StepsProcess Steps
Process StepsmfeKEG
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management Argyle Executive Forum
 
Accident Report - essay
Accident Report - essayAccident Report - essay
Accident Report - essayAnna Isha
 

Andere mochten auch (6)

Gsm based road vehicle accident report system using mems sensor
Gsm based road vehicle accident report system using mems sensor  Gsm based road vehicle accident report system using mems sensor
Gsm based road vehicle accident report system using mems sensor
 
Process Steps
Process StepsProcess Steps
Process Steps
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Implementing Vulnerability Management
Implementing Vulnerability Management Implementing Vulnerability Management
Implementing Vulnerability Management
 
12 report writing i
12 report writing i12 report writing i
12 report writing i
 
Accident Report - essay
Accident Report - essayAccident Report - essay
Accident Report - essay
 

Ähnlich wie Risk Factory: How to Implement an Effective Incident Response Programme

ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityAnthony Dials
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwgJohn M. Kennedy
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresJose L. Quiñones-Borrero
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im finalcavapyta
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be BreachedMike Saunders
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business SolutionsAnthony Dials
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)Stephen Abram
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionNaor Penso
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.pptabhichowdary16
 
Belnet events management
Belnet events managementBelnet events management
Belnet events managementXavier Mertens
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMatthew Rosenquist
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsPhil Huggins FBCS CITP
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...Accellis Technology Group
 

Ähnlich wie Risk Factory: How to Implement an Effective Incident Response Programme (20)

ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
Incident response
Incident responseIncident response
Incident response
 
What to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breachWhat to do when get hacked or suffer a cyber breach
What to do when get hacked or suffer a cyber breach
 
Cause 11 im final
Cause 11   im finalCause 11   im final
Cause 11 im final
 
You Will Be Breached
You Will Be BreachedYou Will Be Breached
You Will Be Breached
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
YBB-NW-distribution
YBB-NW-distributionYBB-NW-distribution
YBB-NW-distribution
 
Cervone uof t - nist framework (1)
Cervone   uof t - nist framework (1)Cervone   uof t - nist framework (1)
Cervone uof t - nist framework (1)
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management Introduction
 
Intro.ppt
Intro.pptIntro.ppt
Intro.ppt
 
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
 
Belnet events management
Belnet events managementBelnet events management
Belnet events management
 
Mergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of InterestMergers and Acquisition Security - Areas of Interest
Mergers and Acquisition Security - Areas of Interest
 
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident CostsFirst Responders Course - Session 3 - Monitoring and Controlling Incident Costs
First Responders Course - Session 3 - Monitoring and Controlling Incident Costs
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 

Mehr von Risk Crew

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Risk Crew
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Risk Crew
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Crew
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Crew
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Crew
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Crew
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Crew
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Crew
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Crew
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Crew
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Crew
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Crew
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Crew
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Crew
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Crew
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Crew
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Crew
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Crew
 

Mehr von Risk Crew (20)

Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891Pcishrinktofitpresentation 151125162550-lva1-app6891
Pcishrinktofitpresentation 151125162550-lva1-app6891
 
Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891Databasetheft 151120161435-lva1-app6891
Databasetheft 151120161435-lva1-app6891
 
Risk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a HackerRisk Factory: Inside the Mind of a Hacker
Risk Factory: Inside the Mind of a Hacker
 
Risk Factory The 2014 Numbers
Risk Factory The 2014 NumbersRisk Factory The 2014 Numbers
Risk Factory The 2014 Numbers
 
Risk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best PracticeRisk Factory Information Security Coordination Challenges & Best Practice
Risk Factory Information Security Coordination Challenges & Best Practice
 
Risk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big DataRisk Factory Big Daddy Digs Big Data
Risk Factory Big Daddy Digs Big Data
 
Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013Risk Factory: Top 10 Risks 2013
Risk Factory: Top 10 Risks 2013
 
Risk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile DevicesRisk Factory: Getting a Grip on Mobile Devices
Risk Factory: Getting a Grip on Mobile Devices
 
Risk Factory: PCI - The Essentials
Risk Factory: PCI - The EssentialsRisk Factory: PCI - The Essentials
Risk Factory: PCI - The Essentials
 
Risk Factory: Beyond Data Leakage
Risk Factory: Beyond Data LeakageRisk Factory: Beyond Data Leakage
Risk Factory: Beyond Data Leakage
 
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment IndustryRisk Factory: Security Lessons From the Online Adult Entertainment Industry
Risk Factory: Security Lessons From the Online Adult Entertainment Industry
 
Risk Factory: Let's Get Physical
Risk Factory: Let's Get PhysicalRisk Factory: Let's Get Physical
Risk Factory: Let's Get Physical
 
Risk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to FitRisk Factory: PCI Shrink to Fit
Risk Factory: PCI Shrink to Fit
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron? Risk Factory: Database Security: Oxymoron?
Risk Factory: Database Security: Oxymoron?
 
Risk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back DoorRisk Factory: Modems the Forgotten Back Door
Risk Factory: Modems the Forgotten Back Door
 
Risk Factory How to Steal an Identity
Risk Factory How to Steal an IdentityRisk Factory How to Steal an Identity
Risk Factory How to Steal an Identity
 
Risk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic EavesdroppingRisk Factory: The State of Electronic Eavesdropping
Risk Factory: The State of Electronic Eavesdropping
 
Risk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best PracticesRisk Factory Geo-location Security Issues & Best Practices
Risk Factory Geo-location Security Issues & Best Practices
 

Risk Factory: How to Implement an Effective Incident Response Programme

  • 2. A simple, easy to use, online, B2B procurement portal for purchasing products and services to identify, minimise and manage the security threat to business data. www.riskfactory.com
  • 3. Overview • Who cares? • Why care? • Success definition • Policy & preparation work • Procedures & forms • Tools & training • Incident database • Reviews & measurements
  • 4. Who Cares? • Specifically? Name these stakeholders now • Eliminate finger pointing potential after • Establish Incident Response Team – List stakeholders roles & responsibilities – Contact details – Team mission statement – Post / Publish / Preach!
  • 5. Why Care? • Because incidents = lost cash £ • Iceberg tip theory • Timely response = minimized loss • Determine exactly who, what, when, why & how • Inform other departments of findings • Prevention & preparation for future • Mitigate risk & liability • Apprehend & prosecute
  • 6. Define Success Limit damage caused by incident Minimize and/ or recover financial losses Minimize downtime Technological recovery Minimize image damage Minimize personal losses Enable resolution of incident Expunge virus/intruder Improve security Disciplinary action (solid evidence is key) Prosecution
  • 7. Response Team Require wide range of technical skills Dedicated response staff Team makeup = skilled in applicable technology Ad hoc team of existing sys admins Multisite teams? Additional duties = additional pay…
  • 8. Policy & Preparation Policy: “What do you do”? Definition = critical. Must be comprehensive Define do’s and don’t Deviations are incidents Define level of incidents Define incident response Keep it simple Write it down Management sign off
  • 9. Ramifications of Going Solo If you don’t define an incident = it never happens Insufficient skills = Failure Insufficient staff = Failure Insufficient tools = Failure Insufficient prep = Failure Scapegoat….
  • 10. Elements a Plan • Incident definition (Major vs. Minor) • Outline response for each type of incident • Reporting Process (Response Team Notification) • Containment Process • Eradication Process • Restoration • Follow-up Process • Reporting
  • 11.
  • 12. Preparation: Do you know where your data is? Workstations Servers (e-mail, databases) Log files (there are many of them) Network traffic (be careful about privacy) Backups (can you find what you need?) Are you prepared to preserve evidence? Hard drives, software, spare hardware
  • 13. Incident Response Process • Initial observation, report, or question • Assessment of severity and worth • Physical assessment • Preserve data on target systems • Network assessment • Preserve related evidence on network • Develop response/investigative strategy • Crime analysis • Conclusions and reports
  • 14. Procedures and Forms Incident numbering system CERT# 2003032201 Communication procedure Who to notify under what circumstances Encrypted e-mail versus phone/pager Procedures for each incident type Virus, DoS, intrusion, telephone system Sexual harassment, threats Forms to ensure consistency Document incident details Evidence collection and documentation
  • 15. Procedures: Evidence Do you have authorization? Employee consent Search warrant Involve human resources & attorneys Admissibility Document all actions (chain of custody) Evidence originated from its purported source Evidence was not altered during/after collection Associated information is accurate (e.g. dates) To shutdown or not to shutdown?
  • 16. Sample Procedure Outline When incident initially reported: Remote information gathering Preserve evidence on network Collecting volatile data Step by step with tools and examples Image hard drives Step by step with tools and examples Restore and secure systems Backup data, reformat drive, rebuild, etc. Communicate to community
  • 17. Documentation: Forms Expense and time logs: dates and times working on incidents, including time to recover systems, helps calculate cost of damage Incident response actions taken and when: telephone conversations helps explain incident response years later Employees questioned and involved: everyone involved may be required to testify Evidence inventory: helps locate evidence later
  • 18. Forms: Evidence Collection • Memory aide, not just extra paperwork • Incident number (#2003032201) • Authorization • Who collected evidence & when • Where the evidence was located • Details of computer systems involved • How the evidence was collected • File names, sizes, hash values • Additional notes
  • 19. Training Understand the technology • Hardware components • System operation and security • Network traffic Train personal in evidence handling • Do you really care about this? Train personnel to use tools • Media analysis • Log analysis • Network exploration (nmap, Nessus, scripts) • Traffic analysis
  • 20. Response & Measurement • Deploy incident response team (procedures!) • Decide whether or not to collect volatile data • Take systems offline for forensic analysis • Probe and monitor network • Interview individuals • Document everything • Correlate data from multiple sources • Communicate with legal counsel and police
  • 21. 26 Dover Street London United Kingdom +44 (0)20 3170 8955 +44 (0)20 3008 6011 (fax)