O'Reilly logo

Developing Cybersecurity Programs and Policies, Third Edition by Sari Greene, Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11

Cybersecurity Incident Response

Chapter Objectives

After reading this chapter and completing the exercises, you will be able to do the following:

  • Prepare for a cybersecurity incident.

  • Identify a cybersecurity incident.

  • Understand the incident response plan.

  • Understand the incident response process.

  • Understand information sharing and coordination.

  • Identify incident response team structure.

  • Understand federal and state data breach notification requirements.

  • Consider an incident from the perspective of the victim.

  • Create policies related to security incident management.

Incidents happen. Security-related incidents have become not only more numerous and diverse but also more damaging and disruptive. A single incident can cause the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required