Virtual Cyber & Technology Risk Management Forum

1(d). IR Playbook

• Based on the most impactful and probable threats you identified in your Threat Assessment, create procedures to respond to those threats: o Ransomware o Malware o DDoS o Credential Stuffing/Password Reuse o Web Application Attacks o External Vulnerability Exploitation (RDP?) • Incident Response Playbook blog here : o https://sbscyber.com/resources/7-steps-to-building-an- incident-response-playbook

© SBS CyberSecurity, LLC www.sbscyber.com

30

Made with FlippingBook Publishing Software