Develop and Implement a Security Incident Management Program



  • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
  • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being re-victimized by the same vector.
  • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

Our Advice

Critical Insight

  • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
  • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
  • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

Impact and Result

  • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
  • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

Develop and Implement a Security Incident Management Program Research & Tools

Start here – read the Executive Brief

Read our concise Executive Brief to find out why you should develop and implement a security incident management program, review Info-Tech’s methodology, and understand the four ways we can support you in completing this project.

Besides the small introduction, subscribers and consulting clients within this management domain have access to:

1. Prepare

Equip your organization for incident response with formal documentation of policies and processes.

  • Develop and Implement a Security Incident Management Program – Phase 1: Prepare
  • Security Incident Management Maturity Checklist ‒ Preliminary
  • Information Security Requirements Gathering Tool
  • Incident Response Maturity Assessment Tool
  • Security Incident Management Charter Template
  • Security Incident Management Policy Template
  • Security Incident Management RACI Tool

2. Operate

Act with efficiency and effectiveness as new incidents are handled.

  • Develop and Implement a Security Incident Management Program – Phase 2: Operate
  • Security Incident Management Plan
  • Security Incident Runbook Prioritization Tool
  • Security Incident Management Runbook: Credential Compromise
  • Security Incident Management Workflow: Credential Compromise (Visio)
  • Security Incident Management Workflow: Credential Compromise (PDF)
  • Security Incident Management Runbook: Distributed Denial of Service
  • Security Incident Management Workflow: Distributed Denial of Service (Visio)
  • Security Incident Management Workflow: Distributed Denial of Service (PDF)
  • Security Incident Management Runbook: Malware
  • Security Incident Management Workflow: Malware (Visio)
  • Security Incident Management Workflow: Malware (PDF)
  • Security Incident Management Runbook: Malicious Email
  • Security Incident Management Workflow: Malicious Email (Visio)
  • Security Incident Management Workflow: Malicious Email (PDF)
  • Security Incident Management Runbook: Ransomware
  • Security Incident Management Workflow: Ransomware (Visio)
  • Security Incident Management Workflow: Ransomware (PDF)
  • Security Incident Management Runbook: Data Breach
  • Security Incident Management Workflow: Data Breach (Visio)
  • Security Incident Management Workflow: Data Breach (PDF)
  • Data Breach Reporting Requirements Summary
  • Security Incident Management Runbook: Third-Party Incident
  • Security Incident Management Workflow: Third-Party Incident (Visio)
  • Security Incident Management Workflow: Third-Party Incident (PDF)
  • Security Incident Management Runbook: Blank Template

3. Maintain and optimize

Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.

  • Develop and Implement a Security Incident Management Program – Phase 3: Maintain and Optimize
  • Security Incident Metrics Tool
  • Post-Incident Review Questions Tracking Tool
  • Root-Cause Analysis Template
  • Security Incident Report Template
[infographic]

Workshop: Develop and Implement a Security Incident Management Program

Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.

1 Prepare Your Incident Response Program

The Purpose

Understand the purpose of incident response.

Formalize the program.

Identify key players and escalation points.

Key Benefits Achieved

Common understanding of the importance of incident response.

Various business units becoming aware of their roles in the incident management program.

Formalized documentation.

Activities

1.1 Assess the current process, obligations, scope, and boundaries of the incident management program.

1.2 Identify key players for the response team and for escalation points.

1.3 Formalize documentation.

1.4 Prioritize incidents requiring preparation.

Outputs

Understanding of the incident landscape

An identified incident response team

A security incident management charter

A security incident management policy

A list of top-priority incidents

A general security incident management plan

A security incident response RACI chart

2 Develop Incident-Specific Runbooks

The Purpose

Document the clear response procedures for top-priority incidents.

Key Benefits Achieved

As incidents occur, clear response procedures are documented for efficient and effective recovery.

Activities

2.1 For each top-priority incident, document the workflow from detection through analysis, containment, eradication, recovery, and post-incident analysis.

Outputs

Up to five incident-specific runbooks

3 Maintain and Optimize the Program

The Purpose

Ensure the response procedures are realistic and effective.

Identify key metrics to measure the success of the program.

Key Benefits Achieved

Real-time run-through of security incidents to ensure roles and responsibilities are known.

Understanding of how to measure the success of the program.

Activities

3.1 Limited scope tabletop exercise.

3.2 Discuss key metrics.

Outputs

Completed tabletop exercise

Key success metrics identified

Further reading

Develop and Implement a Security Incident Management Program

Create a scalable incident response program without breaking the bank.

ANALYST PERSPECTIVE

Security incidents are going to happen whether you’re prepared or not. Ransomware and data breaches are just a few top-of-mind threats that all organizations deal with. Taking time upfront to formalize response plans can save you significantly more time and effort down the road. When an incident strikes, don’t waste time deciding how to remediate. Rather, proactively identify your response team, optimize your response procedures, and track metrics so you can be prepared to jump to action.

Céline Gravelines,
Senior Research Analyst
Security, Risk & Compliance Info-Tech Research Group

Picture of Céline Gravelines

Céline Gravelines,
Senior Research Analyst
Security, Risk & Compliance Info-Tech Research Group

Our understanding of the problem

This Research is Designed For

  • A CISO who is dealing with the following:
    • Inefficient use of time and money when retroactively responding to incidents, negatively affecting business revenue and workflow.
    • Resistance from management to adequately develop a formal incident response plan.
    • Lack of closure of incidents, resulting in being re-victimized by the same vector.

This Research Will Help You

  • Develop a consistent, scalable, and usable incident response program that is not resource intensive.
  • Track and communicate incident response in a formal manner.
  • Reduce the overall impact of incidents over time.
  • Learn from past incidents to improve future response processes.

This Research Will Also Assist

  • Business stakeholders who are responsible for the following:
  • Improving workflow and managing operations in the event of security incidents to reduce any adverse business impacts.
  • Ensuring that incident response compliance requirements are being adhered to.

This Research Will Help Them

  • Efficiently allocate resources to improve incident response in terms of incident frequency, response time, and cost.
  • Effectively communicate expectations and responsibilities to users.

Executive Summary

Situation

  • Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including workflow, revenue generation, and public image.
  • The incident response of most organizations is ad hoc at best. A formal management plan is rarely developed or adhered to, resulting in ineffective firefighting responses and inefficient allocation of resources.

Complication

  • Tracked incidents are often classified into ready-made responses that are not necessarily applicable to the organization. With so many classifications, tracking becomes inefficient and indigestible, allowing major incidents to fall through the cracks.
  • Outcomes of incident response tactics are not formally tracked or communicated, resulting in a lack of comprehensive understanding of trends and patterns regarding incidents, leading to being revictimized by the same vector.
  • Having a formal incident response document to meet compliance requirements is not useful if no one is adhering to it.

Resolution

  • Effective and efficient management of incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities.
  • This blueprint will walk through the steps of developing a scalable and systematic incident response program relevant to your organization.

Info-Tech Insight

  • You will experience incidents. Don’t rely on ready-made responses. They’re too broad and easy to ignore. Save your organization response time and confusion by developing your own specific incident use cases.
  • Analyze, track, and review results of incident response regularly. Without a comprehensive understanding of incident trends and patterns, you can be re-victimized by the same attack vector.
  • Establish communication processes and channels well in advance of a crisis. Don’t wait until a state of panic. Collaborate and exchange information with other organizations to stay ahead of incoming threats.

Data breaches are resulting in major costs across industries

Per capita cost by industry classification of benchmarked companies (measured in USD)

This is a bar graph showing the per capita cost by industry classification of benchmarked companies(measured in USD). the companies are, in decreasing order of cost: Health; Financial; Services; Pharmaceutical; Technology; Energy; Education; Industrial; Entertainment; Consumer; Media; Transportation; Hospitality; Retail; Research; Public

Average data breach costs per compromised record hit an all-time high of $148 (in 2018).
(Source: IBM, “2018 Cost of Data Breach Study)”

% of systems impacted by a data breach
1%
No Impact
19%
1-10% impacted
41%
11-30% impacted
24%
31-50% impacted
15%
> 50% impacted
% of customers lost from a data breach
61% Lost
< 20%
21% Lost 20-40% 8% Lost
40-60%
6% Lost
60-80%
4% Lost
80-100%
% of customers lost from a data breach
58% Lost
<20%
25% Lost
20-40%
9% Lost
40-60%
5% Lost
60-80%
4% Lost
80-100%

Source: Cisco, “Cisco 2017 Annual Cybersecurity Report”

Defining what is security incident management

IT Incident

Any event not a part of the standard operation of a service which causes, or may cause, the interruption to, or a reduction in, the quality of that service.

Security Event:

A security event is anything that happens that could potentially have information security implications.

  • A spam email is a security event because it may contain links to malware.
  • Organizations may be hit with thousands or perhaps millions of identifiable security events each day.
  • These are typically handled by automated tools or are simply logged.

Security Incident:

A security incident is a security event that results in damage such as lost data.

  • Incidents can also include events that don't involve damage but are viable risks.
  • For example, an employee clicking on a link in a spam email that made it through filters may be viewed as an incident.

It’s not a matter of if you have a security incident, but when

The increasing complexity and prevalence of threats have finally caught the attention of corporate leaders. Prepare for the inevitable with an incident response program.

  1. A formalized incident response program reduced the average cost of a data breach (per capita) from $148 to $134, while third-party involvement increased costs by $13.40.
  2. US organizations lost an average of $7.91 million per data breach as a result of increased customer attrition and diminished goodwill. Canada and the UK follow suit at $1.57 and $1.39 million, respectively.
  3. 73% of breaches are perpetrated by outsiders, 50% are the work of criminal groups, and 28% involve internal actors.
  4. 55% of companies have to manage fallout, such as reputational damage after a data breach.
  5. The average cost of a data breach increases by $1 million if left undetected for > 100 days.

(Sources: IBM, “2018 Cost of Data Breach Study”; Verizon, “2017 Data Breach Investigations Report”; Cisco, “Cisco 2018 Annual Cybersecurity Report”)

Threat Actor Examples

The proliferation of hacking techniques and commoditization of hacking tools has enabled more people to become threat actors. Examples include:
  • Organized Crime Groups
  • Lone Cyber Criminals
  • Competitors
  • Nation States
  • Hacktivists
  • Terrorists
  • Former Employees
  • Domestic Intelligence Services
  • Current Employees (malicious and accidental)

Benefits of an incident management program

Effective incident management will help you do the following:

Improve efficacy
Develop structured processes to increase process consistency across the incident response team and the program as a whole. Expose operational weak points and transition teams from firefighting to innovating.

Improve threat detection, prevention, analysis, and response
Enhance your pressure posture through a structured and intelligence-driven incident handling and remediation framework.

Improve visibility and information sharing
Promote both internal and external information sharing to enable good decision making.

Create and clarify accountability and responsibility
Establish a clear level of accountability throughout the incident response program, and ensure role responsibility for all tasks and processes involved in service delivery.

Control security costs
Effective incident management operations will provide visibility into your remediation processes, enabling cost savings from misdiagnosed issues and incident reduction.

Identify opportunities for continuous improvement
Increase visibility into current performance levels and accurately identify opportunities for continuous improvement with a holistic measurement program.

Impact

Short term:
  • Streamlined security incident management program.
  • Formalized and structured response process.
  • Comprehensive list of operational gaps and initiatives.
  • Detailed response runbooks that predefine necessary operational protocol.
  • Compliance and audit adherence.
Long term:
  • Reduced incident costs and remediation time.
  • Increased operational collaboration between prevention, detection, analysis, and response efforts.
  • Enhanced security pressure posture.
  • Improved communication with executives about relevant security risks to the business.
  • Preserved reputation and brand equity.

Incident management is essential for organizations of any size

Your incidents may differ, but a standard response ensures practical security.

Certain regulations and laws require incident response to be a mandatory process in organizations.

Compliance Standard Examples Description
Federal Information Security Modernization Act (FISMA)
  • Organizations must have “procedures for detecting, reporting, and responding to security incidents” (2002).
  • They must also “inform operators of agency information systems about current and potential information security threats and vulnerabilities.”
Federal Information Processing Standards (FIPS)
  • “Organizations must: (i) establish an operational incident handling capability for organizational information systems that includes adequate preparation, detection, analysis, containment, recovery, and user response activities.”
Payment Card Industry Data Security Standard (PCI DSS v3)
  • 12.5.3: “Establish, document, and distribute security incident response and escalation procedures to ensure timely and effective handling of all situations.”
Health Insurance Portability and Accountability Act (HIPAA)
  • 164.308: Response and Reporting – “Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes.”

Security incident management is applicable to all verticals

Examples:
  • Finance
  • Insurance
  • Healthcare
  • Public administration
  • Education services
  • Professional services
  • Scientific and technical services

Maintain a holistic security operations program

Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization.

Security operations is part of what Info-Tech calls a threat collaboration environment, where members must actively collaborate to address cyberthreats affecting the organization’s brand, business operation, and technology infrastructure on a daily basis.

Prevent: Defense in depth is the best approach to protect against unknown and unpredictable attacks. Diligent patching and vulnerability management, endpoint protection, and strong human-centric security (amongst other tactics) are essential. Detect: There are two types of companies – those who have been breached and know it, and those who have been breached and don’t know it. Ensure that monitoring, logging, and event detection tools are in place and appropriate to your organizational needs.
Analyze: Raw data without interpretation cannot improve security and is a waste of time, money, and effort. Establish a tiered operational process that not only enriches data but also provides visibility into your threat landscape. Respond: Organizations can’t rely on an ad hoc response anymore – don’t wait until a state of panic. Formalize your response processes in a detailed incident runbook to reduce incident remediation time and effort.

Info-Tech’s incident response blueprint is one of four security operations initiatives

Design and Implement a Vulnerability Management Program Vulnerability Management
Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
  • Vulnerability Tracking Tool
  • Vulnerability Scanning Tool RFP Template
  • Penetration Test RFP Template
  • Vulnerability Mitigation Process Template
Integrate Threat Intelligence Into Your Security Operations Vulnerability Management
Vulnerability management revolves around the identification, prioritization, and remediation of vulnerabilities. Vulnerability management teams hunt to identify which vulnerabilities need patching and remediating.
  • Threat Intelligence Maturity Assessment Tool
  • Threat Intelligence RACI Tool
  • Threat Intelligence Management Plan Template
  • Threat Intelligence Policy Template
  • Threat Intelligence Alert Template
  • Threat Intelligence Alert and Briefing Cadence Schedule Template
Develop Foundational Security Operations Processes Operations
Security operations include the real-time monitoring and analysis of events based on the correlation of internal and external data sources. This also includes incident escalation based on impact. These analysts are constantly tuning and tweaking rules and reporting thresholds to further help identify which indicators are most impactful during the analysis phase of operations.
  • Security Operations Maturity Assessment Tool
  • Security Operations Event Prioritization Tool
  • Security Operations Efficiency Calculator
  • Security Operations Policy
  • In-House vs. Outsourcing Decision-Making Tool
  • Seccrimewareurity Operations RACI Tool
  • Security Operations TCO & ROI Comparison Calculator
Develop and Implement a Security Incident Management Program Incident Response (IR)
Effective and efficient management of incidents involves a formal process of analysis, containment, eradication, recovery, and post-incident activities. Incident response teams coordinate root cause and incident gathering while facilitating post-incident lessons learned. Incident response can provide valuable threat data that ties specific indicators to threat actors or campaigns.
Security Incident Management Policy
  • Security Incident Management Plan
  • Incident Response Maturity Assessment Tool
  • Security Incident Runbook Prioritization Tool
  • Security Incident Management RACI Tool
  • Various Incident Management Runbooks

Understand how incident response ties into related processes

Info-Tech Resources:
Business Continuity Plan Develop a Business Continuity Plan
Disaster Recovery Plan Create a Right-Sized Disaster Recovery Plan
Security Incident Management Develop and Implement a Security Incident Management Program
Incident Management Incident and Problem Management
Service Desk Standardize the Service Desk

Develop and Implement a Security Incident Management Program – project overview

1. Prepare 2. Operate 3. Maintain and Optimize
Best-Practice Toolkit 1.1 Establish the Drivers, Challenges, and Benefits.

1.2 Examine the Security Incident Landscape and Trends.

1.3 Understand Your Security Obligations, Scope, and Boundaries.

1.4 Gauge Your Current Process to Identify Gaps.

1.5 Formalize the Security Incident Management Charter.

1.6 Identify Key Players and Develop a Call Escalation Tree.

1.7 Develop a Security Incident Management Policy.

2.1 Understand the Incident Response Framework.

2.2 Understand the Purpose of Runbooks.

2.3 Prioritize the Development of Incident-Specific Runbooks.

2.4 Develop Top-Priority Runbooks.

2.5 Fill Out the Root-Cause Analysis Template.

2.6 Customize the Post-Incident Review Questions Tracking Tool to Standardize Useful Questions for Lessons-Learned Meetings.

2.7 Complete the Security Incident Report Template.

3.1 Conduct Tabletop Exercises.

3.2 Initialize a Security Incident Management Metrics Program.

3.3 Leverage Best Practices for Continuous Improvement.

Guided Implementations Understand the incident response process, and define your security obligations, scope, and boundaries.

Formalize the incident management charter, RACI, and incident management policy.
Use the framework to develop a general incident management plan.

Prioritize and develop top-priority runbooks.
Develop and facilitate tabletop exercises.

Create an incident management metrics program, and assess the success of the incident management program.
Onsite Workshop Module 1:
Prepare for Incident Response
Module 2:
Handle Incidents
Module 3:
Review and Communicate Security Incidents
Phase 1 Outcome:
  • Formalized stakeholder support
  • Security Incident Management Policy
  • Security Incident Management Charter
  • Call Escalation Tree
  • Phase 2 Outcome:
    • A generalized incident management plan
    • A prioritized list of incidents
    • Detailed runbooks for top-priority incidents
    Phase 3 Outcome:
    • A formalized tracking system for benchmarking security incident metrics.
    • Recommendations for optimizing your security incident management processes.

    Workshop overview

    Contact your account representative or email Workshops@InfoTech.com for more information.

    Workshop Day 1 Workshop Day 2 Workshop Day 3 Workshop Day 4 Workshop Day 5
    Activities
    • Kick off and introductions.
    • High-level overview of weekly activities and outcomes.
    • Understand the benefits of security incident response management.
    • Formalize stakeholder support.
    • Assess your current process, obligations, and scope.
    • Develop RACI chart.
    • Define impact and scope.
    • Identify key players for the threat escalation protocol.
    • Develop a security incident response policy.
    • Develop a general security incident response plan.
    • Prioritize incident-specific runbook development.
    • Understand the incident response process.
    • Develop general and incident-specific call escalation trees.
    • Develop specific runbooks for your top-priority incidents (e.g. ransomware).
      • Detect the incident.
      • Analyze the incident.
      • Contain the incident.
      • Eradicate the root cause.
      • Recover from the incident.
      • Conduct post-incident analysis and communication.
    • Develop specific runbooks for your next top-priority incidents:
      • Detect the incident.
      • Analyze the incident.
      • Contain the incident.
      • Eradicate the root cause.
      • Recover from the incident.
      • Conduct post-incident analysis and communication.
    • Determine key metrics to track and report.
    • Develop post-incident activity documentation.
    • Understand best practices for both internal and external communication.
    • Finalize key deliverables created during the workshop.
    • Present the security incident response program to key stakeholders.
    • Workshop executive presentation and debrief.
    • Finalize main deliverables.
    • Schedule subsequent Analyst Calls.
    • Schedule feedback call.
    Deliverables
    • Security Incident Management Maturity Checklist ‒ Preliminary
    • Security Incident Management RACI Tool
    • Security Incident Management Policy
    • General incident management plan
    • Security Incident Management Runbook
    • Development prioritization
    • Prioritized list of runbooks
    • Understanding of incident handling process
    • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
    • Discussion points for review with response team
    • Incident-specific runbooks for two incidents (including threat escalation criteria and Visio workflow)
    • Discussion points for review with response team
    • Security Incident Metrics Tool
    • Post-Incident Review Questions Tracking Tool
    • Post-Incident Report Analysis Template
    • Root Cause Analysis Template
    • Post-Incident Review Questions Tracking Tool
    • Communication plans
    • Workshop summary documentation
  • All final deliverables
  • Measured value for Guided Implementations

    Engaging in GIs doesn’t just offer valuable project advice – it also results in significant cost savings.

    GI Purpose Measured Value
    Section 1: Prepare

    Understand the need for an incident response program.
    Develop your incident response policy and plan.
    Develop classifications around incidents.
    Establish your program implementation roadmap.

    Time, value, and resources saved using our classification guidance and templates: 2 FTEs*2 days*$80,000/year = $1,280
    Time, value, and resources saved using our classification guidance and templates:
    2 FTEs*5 days*$80,000/year = $3,200

    Section 2: Operate

    Prioritize runbooks and develop the processes to create your own incident response program:

  • Detect
  • Analyze
  • Contain
  • Eradicate
  • Recover
  • Post-Incident Activity
  • Time, value, and resources saved using our guidance:
    4 FTEs*10 days*$80,000/year = $12,800 (if done internally)

    Time, value, and resources saved using our guidance:
    1 consultant*15 days*$2,000/day = $30,000 (if done by third party)
    Section 3: Maintain and Optimize Develop methods of proper reporting and create templates for communicating incident response to key parties. Time, value, and resources saved using our guidance, templates, and tabletop exercises:
    2 FTEs*3 days*$80,000/year = $1,920
    Total Costs To just get an incident response program off the ground. $49,200

    Insurance company put incident response aside; executives were unhappy

    Organization implemented ITIL, but formal program design became less of a priority and turned more ad hoc.

    Situation

    • Ad hoc processes created management dissatisfaction around the organization’s ineffective responses to data breaches.
    • Because of the lack of formal process, an entirely new security team needed to be developed, costing people their positions.

    Challenges

    • Lack of criteria to categorize and classify security incidents.
    • Need to overhaul the long-standing but ineffective program means attempting to change mindsets, which can be time consuming.
    • Help desk is not very knowledgeable on security.
    • New incident response program needs to be in alignment with data classification policy and business continuity.
    • Lack of integration with MSSP’s ticketing system.

    Next steps:

    • Need to get stakeholder buy-in for a new program.
    • Begin to establish classification/reporting procedures.

    Follow this case study to Phase 1

    Phase 1

    Prepare

    Develop and Implement a Security Incident Management Program

    Phase 1: Prepare

    PHASE 1 PHASE 2 PHASE 3
    Prepare Operate Optimize

    This phase walks you through the following activities:

    1.1 Establish the drivers, challenges, and benefits.
    1.2 Examine the security incident landscape and trends.
    1.3 Understand your security obligations, scope, and boundaries.
    1.4 Gauge your current process to identify gaps.
    1.5 Formalize a security incident management charter.
    1.6 Identify key players and develop a call escalation tree.
    1.7 Develop a security incident management policy.

    This phase involves the following participants:

    • CISO
    • Security team
    • IT staff
    • Business leaders

    Outcomes of this phase

    • Formalized stakeholder support.
    • Security incident management policy.
    • Security incident management charter.
    • Call escalation tree.

    Phase 1 outline

    Call 1-888-670-8889 or email GuidedImplementations@InfoTech.com for more information.

    Complete these steps on your own, or call us to complete a guided implementation. A guided implementation is a series of 2-3 advisory calls that help you execute each phase of a project. They are included in most advisory memberships.

    Guided Implementation 1: Prepare for Incident Response
    Proposed Time to Completion: 3 Weeks
    Step 1.1-1.3 Understand Incident Response Step 1.4-1.7 Begin Developing Your Program
    Start with an analyst kick-off call:
  • Discuss your current incident management status.
  • Review findings with analyst:
  • Review documents.
  • Then complete these activities…
    • Establish your security obligations, scope, and boundaries.
    • Identify the drivers, challenges, and benefits of formalized incident response.
    • Review any existing documentation.
    Then complete these activities…
    • Discuss further incident response requirements.
    • Identify key players for escalation and notifications.
    • Develop the policy.
    • Develop the plan.

    With these tools & templates:
    Security Incident Management Maturity Checklist ‒ Preliminary Information Security Requirements Gathering Tool

    With these tools & templates:
    Security Incident Management Policy
    Security Incident Management Plan
    Phase 1 Results & Insights:

    Ready-made incident response solutions often contain too much coverage: too many irrelevant cases that are not applicable to the organization are accounted for, making it difficult to sift through all the incidents to find the ones you care about. Develop specific incident use cases that correspond with relevant incidents to quickly identify the response process and eliminate ambiguity when handled by different individuals.

    Ice breaker: What is a security incident for your organization?

    1.1 Whiteboard Exercise – 60 minutes

    How do you classify various incident types between service desk, IT/infrastructure, and security?

    • Populate sticky notes with various incidents and assign them to the appropriate team.
      • Who owns the remediation? When are other groups involved? What is the triage/escalation process?
      • What other groups need to be notified (e.g. cyber insurance, Legal, HR, PR)?
      • Are there dependencies among incidents?
      • What are we covering in the scope of this project?

    Buying Options

    Develop and Implement a Security Incident Management Program

    €69.98
    (Excl. 21% tax)

    Client rating

    9.2/10 Overall Impact

    Cost Savings

    $105,346 Average $ Saved

    Days Saved

    39 Average Days Saved

     

    IT Risk Management · IT Leadership & Strategy implementation · Operational Management · Service Delivery · Organizational Management · Process Improvements · ITIL, CORM, Agile · Cost Control · Business Process Analysis · Technology Development · Project Implementation · International Coordination · In & Outsourcing · Customer Care · Multilingual: Dutch, English, French, German, Japanese · Entrepreneur
    Tymans Group is a brand by Gert Taeymans BV
    Gert Taeymans bv
    Europe: Koning Albertstraat 136, 2070 Burcht, Belgium — VAT No: BE0685.974.694 — phone: +32 (0) 468.142.754
    USA: 4023 KENNETT PIKE, SUITE 751, GREENVILLE, DE 19807 — Phone: 1-917-473-8669

    Copyright 2017-2022 Gert Taeymans BV