Virtual Cyber & Technology Risk Management Forum
III. Security Operations (IS Booklet)
• Threat Identification and Assessment • More focused then Risk Identification Process • Monitor for hostile cyber or physical threats, human errors, structure failures, and man-made or natural disasters. • Leverage attack trees, event trees, and kill chains • Threat Monitoring • Establish responsibility and authority to monitor systems • Network, host, and application monitoring • Incident Identification and Assessment • Identify indicators of compromise and analyze events • Leverage identification systems such as: ISP, Endpoint monitors, DLP, Logs, file integrity…. • Escalate and report . • Incident Response
• Establishes when and who should enact Incident Response • Defined Process to address the threat and return to operations
© SBS CyberSecurity, LLC www.sbscyber.com
21
Made with FlippingBook Publishing Software