Virtual Cyber & Technology Risk Management Forum
1(d). IR Playbook
• Based on the most impactful and probable threats you identified in your Threat Assessment, create procedures to respond to those threats: o Ransomware o Malware o DDoS o Credential Stuffing/Password Reuse o Web Application Attacks o External Vulnerability Exploitation (RDP?) • Incident Response Playbook blog here : o https://sbscyber.com/resources/7-steps-to-building-an- incident-response-playbook
© SBS CyberSecurity, LLC www.sbscyber.com
30
Made with FlippingBook Publishing Software