Instructor for this course
more

The number of cyber events continues to increase sharply. This is leading to widespread recognition that some cyber events cannot be stopped. Organizations are improving their prevention capabilities with modern technology and tools while augmenting cyber event detection and response capabilities. Previous segments have dissected portions of the National Institute of Standards and Technology (NIST) cybersecurity framework related to:

  • Identify assets to protect
  • Protect assets
  • Detect threats

The next concept to visit is the respond function. Respond represents the need to develop/implement appropriate activities to take action regarding a detected cybersecurity event. In the past, organizations focused information security efforts on cyber event protection. However, adversaries have modified attack techniques to make protection much more difficult.

Respond and recovery brings together numerous processes and activities, such as business continuity and disaster recovery planning and plan execution. The respond function supports the ability to contain the impact of a potential cybersecurity event. This segment delves deeply into concepts that must be well understood and planned in order to ensure the respond function is effective.

Learning Objectives

  • Explore the requirements of the respond function in a cyber risk assessment.
  • Identify critical concepts of response planning.
  • Identify important components of communication in the response phase.
  • Identify how to properly “analyze” for the response phase.
  • Explore steps to instill improvements as part of the response phase.
  • Explore the importance of mitigation of identified incidents as part of the response phase.
Last updated/reviewed: July 6, 2018

Included In Certifications

This course is included in the following Expert Certifications:

13 CoursesCorporate Cyber Security Certification

  1. Cyber Threat – The Modern-Day Fraud: Breaches and Actions
  2. A Primer on Cyber Security Programs and Roles
  3. Cyber Risk Management Frameworks and Concepts
  4. Cyber Risk Assessment - Identify Critical Assets
  5. Cyber Risk Assessment – Prioritize Assets for Protection
  6. Cyber Risk Assessment - Protect Assets from Threats
  7. Cyber Risk Assessment – Detect Threats Part One
  8. Cyber Risk Assessment – Detect Threats Part Two
  9. Cyber Risk Assessment – Respond to Incidents
  10. Cyber Risk Assessment – Recover from Incidents
  11. Measuring Cyber Risk Utilizing Tiers
  12. Personal Identity Theft
  13. The Business Identity Theft Crisis

1 Review (3 ratings)Reviews

5
Anonymous Author
The 5 steps and processes under Respond are well defined and organized

Prerequisites

Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. However, it is recommended to take the other courses in the series prior to completing this one.

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  7:56Introduction to Cyber Risk Assessment – Respond to Incidents
  10:51Respond
  9:03Mobilizing Response
  12:34Response Planning
  7:50Communications
  9:32Analysis
  3:14Mitigation
  7:33Improvements
  5:08Enterprise Response Tool
  3:39Summary
CONTINUOUS PLAY
  1:17:19Cyber Risk Assessment – Respond to Incidents
SUPPORTING MATERIALS
  PDFSlides: Cyber Risk Assessment – Respond to Incidents
  PDFCyber Risk Assessment – Respond to Incidents Glossary/Index
REVIEW AND TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM