In this video, discover the various team models, such as centralized, distributed, and coordinating teams.
The three structures that can be used … to each segment. … And then you might have another team … it's still important to know that every team … exploited in one region may also … be exploited in another region … a coordinating team assigned to support other centralized … when a very large-scale incident occurs. … This coordinating team may be responsible … for helping multiple incident response teams … This is sometimes called a team of teams model as well. … the centralized, distributed or coordinating model … when dealing with incident response teams. … of some employees, but you also supplement … who handles the 24 hours a day, seven days a week … Now this works extremely well for small … so outsourcing here makes a lot of sense. … that happens every day, but for something major like this, … and so it's important to keep that oversight in place. …
Author
Released
6/21/2019- Differences between events and incidents
- Elements of policies, plans, and procedures
- The structure of the incident response team
- Selecting a team model
- Leading a team during an incident
- Internal information sharing
- Incident prevention
- Detection and analysis
- Containment, eradication, and recovery
- Calculating the cost of an incident
Skill Level Beginner
Duration
Views
Related Courses
-
Cybersecurity for Executives
with Kip Boyle1h 46m Intermediate -
Reasonable Cybersecurity for Business Leaders
with Kip Boyle26m 38s Intermediate -
Cybersecurity for IT Professionals
with Malcolm Shore2h 27m Beginner -
The Cybersecurity Threat Landscape
with Marc Menninger52m 49s Beginner
-
Introduction
-
The need for a plan2m 34s
-
1. Incident Response Planning
-
Events and incidents4m 56s
-
Elements of a policy6m 12s
-
Elements of a plan5m 13s
-
Elements of a procedure3m 42s
-
-
2. Incident Response Team
-
Different team models6m 46s
-
Selecting a team model6m 3s
-
Incident response personnel5m 13s
-
Organizational dependencies6m 23s
-
3. Communication
-
Coordinating your efforts3m 58s
-
Internal information sharing3m 33s
-
Business impact analysis1m 48s
-
Technical analysis4m 4s
-
External information sharing3m 57s
-
-
4. Preparation
-
Preparation2m 14s
-
Hardware and software4m 22s
-
Software resources2m 56s
-
Incident prevention6m 34s
-
-
5. Detection and Analysis
-
Attack vectors5m 18s
-
Detecting an incident4m 25s
-
Indicators of compromise3m 50s
-
Conducting analysis5m 30s
-
Documenting the incident3m 21s
-
Prioritizing the incident5m 28s
-
Notification procedures2m 11s
-
-
6. Containment, Eradication, and Recovery
-
Containment strategies6m 29s
-
Identifying the attacker3m 4s
-
Eradication and recovery4m 54s
-
-
7. Post-Incident Activity
-
Lessons learned3m 48s
-
Metrics and measures3m 15s
-
Retaining the evidence2m 9s
-
Calculating the cost2m 10s
-
-
Conclusion
-
What to do next2m 17s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Different team models