Cyber incident response management (CIRM) webinar series
This three-part webinar series on incident response planning and management is designed to provide a broad understanding of incident response, helping participants recognise and mitigate potential risks before they become full-blown problems that lead to reputational damage, loss of customers and hefty fines.
Wednesday, 11 July 2018, 3:00 – 4:00 pm (BST)
The first webinar in the series explains general incident response concepts. It focuses on the importance of incident response within the General Data Protection Regulation (GDPR) and Directive on security of network and information systems (NIS Directive (now transposed in UK law as the NIS Regulations 2018)) frameworks and delivers an overview of the CIRM process. The webinar will also explain why an incident response management system is central to cyber resilience, business continuity and disaster recovery, and offer a brief explanation of the CREST methodology.
Read more >>
- An overview of the GDPR and NIS Directive compliance frameworks.
- Similarities and differences between the GDPR and NIS Directive.
- GDPR – what the law states.
- GDPR – what the law implies: considerations and incident response management as an essential means of providing data privacy, data protection and cyber resilience; reporting requirements.
- NIS Directive: what it is; operators of essential services (OES); digital service providers (DSPs).
- Technology considerations.
- Competent authorities and reporting requirements.
- General incident response management concepts and the CREST methodology.
Wednesday, 15 August 2018, 3:00 – 4:00 pm BST
The second webinar focuses on the incident response process itself. It explains the terminology used and presents and describes different types of cyber attacks to give a clearer understanding of how vulnerabilities are exploited and what strategies are used to minimise risk.
Read more >>
- What is CIRM?
- Definitions: event and incident.
- Current cyber threat landscape: example threats, threat actors, attack vectors, attack surfaces.
- The cyber kill-chain.
- Cyber attack example: Target.
- Incident response process: CREST.
Thursday, 20 September 2018, 3:00 – 4:00 pm BST
The third and final webinar deals with incident response planning consideration and implementation, and the reporting requirements of the incident response system. Planning is based on an organisation’s infrastructure topology and risk exposure, and implementation entails the development of an incident response team and test scenarios. Report generation is the end product of the incident response process. It provides the audit trail details of an incident and is a requirement of all major regulatory frameworks and compliance standards.
Read more >>
- Reporting incidents.
- Identifying critical assets.
- What should be included in the incident response plan.
- Typical attack scenarios.
- How can IT Governance help?