O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Build Security Incident Response for GDPR Data Protection

Video Description

Get free GDPR and incident response templates and documentation - Practical GDPR and incident response blueprint

About This Video

  • The author strongly recommends that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.
  • The course is delivered in a mix of over the shoulder lessons and PowerPoint presentations. So, either it shows you clicks on the screen and how exactly you do different actions, or it presents you the full concept using slides.
  • On top of that, you will get downloadable resources that will help you in your journey.

In Detail

In this course you will learn what incident response is and how it relates to GDPR, and if you are used to the author-led style, you will do it from 3 perspectives: theory, processes and technology. The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand incident response challenges, difference between a NOC and a SOC and how the latest can help in defining the incident response process. We will follow up with GDPR relation and the impact of GDPR to incident response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the roadmap. And all of these are separate resources that you will get! In the end, the author will give an incredible collection of incident response free tools and resources that the author has built during time.

Table of Contents

  1. Chapter 1 : Introduction
    1. Welcome & Intro 00:01:58
    2. Set your expectations 00:00:55
    3. A 1st touch of what you will really get in the course 00:06:10
  2. Chapter 2 : Incident Response in Cybersecurity
    1. What is Incident Response and why do I need it? 00:04:14
    2. Incident Response Team 00:08:53
    3. Incident Response Process and Procedures 00:11:06
    4. Types of Security Incidents 00:08:20
    5. Incident Response Tools – general 00:10:27
    6. What is a SIEM? 00:03:06
    7. Incident Response Training 00:05:49
    8. What is automation in incident response? 00:08:15
  3. Chapter 3 : Building a Security Operations Center (SOC)
    1. What is a NOC? 00:02:37
    2. What is a SOC? 00:02:50
    3. Integrated NOC and SOC 00:06:27
    4. Mission, Team and Required Training 00:06:39
    5. Types of SOC 00:03:53
    6. Building a SOC 00:05:40
    7. Cheat Sheets to help you in configuring your systems 00:09:22
  4. Chapter 4 : GDPR and Incident Response
    1. GDPR intro 00:02:49
    2. GDPR effects on Incident Response 00:05:42
    3. How to create an effective IR plan 00:10:49
    4. GDPR Incident Response Process 00:10:14
    5. Let’s draft the IRM Procedure 00:04:31
    6. How to treat data breaches 00:04:55
  5. Chapter 5 : GDPR Incident Response Methodologies (IRM)
    1. IRM1 - Worm Infection 00:03:11
    2. IRM2 - Windows Intrusion 00:02:55
    3. IRM3 - Unix/Linux Intrusion Detection 00:02:23
    4. IRM4 – DdoS 00:03:55
    5. IRM5 - Malicious Network Behaviour 00:02:27
    6. IRM6 - Website Defacement 00:02:22
    7. IRM7 - Windows malware detection 00:02:36
    8. IRM8 – Blackmail 00:01:55
    9. IRM9 – SmartphoneMalware 00:02:55
    10. IRM10 - Social Engineering 00:02:56
    11. IRM11 - Information Leakage 00:02:33
    12. IRM12 - Insider Abuse 00:01:35
    13. IRM13 – Phishing 00:01:42
    14. IRM14 – Scam 00:02:03
    15. IRM15 – Ransomware 00:02:03
  6. Chapter 6 : Incident Response Tools for GDPR compliance - free vs enterprise
    1. Lessons learned by working in a SOC 00:08:00
    2. A list of open source tools to use 00:06:10
    3. Windows Defender ATP 00:09:15
  7. Chapter 7 : Conclusion
    1. Final thoughts and other documents 00:01:22