Data Breach Preparation and Response

Book description

Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

  • Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data
  • Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach
  • Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach
  • Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization
  • Explains strategies for proactively self-detecting a breach and simplifying a response
  • Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time
  • Shows how to leverage threat intelligence to improve breach response and management effectiveness
  • Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines
  • Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. About the Author
  6. About the Contributors
  7. Acknowledgments
  8. Chapter 1: An Overview of Data Breaches
    1. Abstract
    2. Introduction
    3. What Is a Data Breach?
    4. Lifecycle of a Breach
    5. Sources of Data Breaches
    6. Impact of a Data Breach
    7. Historical Challenges With Breach Management
    8. Summary
  9. Chapter 2: Preparing to Develop a Computer Security Incident Response Plan
    1. Abstract
    2. Introduction
    3. CSIR Plan Planning
    4. Summary
  10. Chapter 3: Developing a Computer Security Incident Response Plan
    1. Abstract
    2. Introduction
    3. Developing the Data Breach Response Policy
    4. CSIR Plan Validation and Testing
    5. Summary
  11. Chapter 4: Qualifying and Investigating a Breach
    1. Abstract
    2. Introduction
    3. Invoking the CSIR Team
    4. Critical First Responder Steps
    5. Engaging and Managing Third Parties
    6. Investigating the Suspected Breach
    7. Confirming or Denying a Suspected Breach
    8. Conclusion
  12. Chapter 5: Containing a Breach
    1. Abstract
    2. Introduction
    3. Breach Containment
    4. Removing Posted Information From the Internet
    5. Containing Compromised Systems
    6. Summary
  13. Chapter 6: Precisely Determining the Scope of a Breach
    1. Introduction
    2. Database Forensics Overview
    3. Using Database Forensics in an Investigation
    4. Database Forensic Tools
    5. Connecting to the Database
    6. Database Artifacts
    7. Analyzing Database Artifacts
    8. What Are You Trying to Accomplish With Your Investigation?
    9. Summary
  14. Chapter 7: Communicating Before, During and After a Breach
    1. Abstract
    2. Introduction: The Concept of Cyber Resilience
    3. Before a Crisis
    4. During a Crisis
    5. After a Crisis
  15. Chapter 8: Restoring Trust and Business Services After a Breach
    1. Abstract
    2. Introduction
    3. The Difference Between Containment and Recovery
    4. Recovering Your Environment
    5. Certifying Your Environment
    6. Restoring Business Services
    7. Conducting a Breach Postmortem Review
    8. Improving Cyber Security After a Breach
    9. Creating a Cyber Defensible Position
    10. Summary
  16. Chapter 9: Preparing for Breach Litigation
    1. Abstract
    2. Introduction
    3. Breach Litigation
    4. From Claim to Settlement
    5. The Volume of Breach Lawsuits
    6. Preparing for Breach Litigation
    7. Breaches and the Board
    8. Summary
  17. Appendix
  18. Index

Product information

  • Title: Data Breach Preparation and Response
  • Author(s): Kevvie Fowler
  • Release date: June 2016
  • Publisher(s): Syngress
  • ISBN: 9780128034507