As the full incident response team assembles, they move from the isolation and quarantine strategy used by first responders into a full incident mitigation mode designed to control the damage and loss caused to the organization by performing a full range of incident containment activities. In this video, learn about the process of incident mitigation, including damage and loss control.
- [Narrator] As the full incident response team assembles…they move from the isolation and quarantine strategy…used by first responders…into a full incident mitigation mode.…The goal of this mitigation phase…is controlling the damage and loss…caused to the organization…by performing a full range…of incident containment activities.…The nature of those activities…will vary based upon the severity of the incident.…The National Institute for Standards and Technology…suggests six criteria that responders may use…when evaluating a potential containment strategy.…
First, responders should consider…the potential for damage and theft…of resources during the incident.…Second, they should evaluate the need…for evidence preservation and the effect…that the strategy might have…on the ability to preserve evidence.…Third, responders should evaluate…service availability requirements…and the impact of different containment strategies…on that service availability.…Fourth, responders must understand…the time and resources required…
Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Conducting investigations
- Reporting and documenting incidents
- Continuous security monitoring
- Preventing data loss and theft
- Asset management
- Change management
- Virtualization security
- Security principles: need to know, separation of duties, and more
- Building an incident response program
- Personnel safety and emergency management
Skill Level Intermediate
Insights from a Cybersecurity Professionalwith Mike Chapple32m 15s Intermediate
1. Investigations and Forensics
2. Logging and Monitoring
Data loss prevention6m 34s
3. Resource Security
4. Security Principles
5. Incident Management
6. Personnel Safety
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.