Book description
Are you satisfied with the way your company responds to IT incidents? How prepared is your response team to handle critical, time-sensitive events such as service disruptions and security breaches? IT professionals looking for effective response models have successfully adopted the Incident Management System (IMS) used by firefighters throughout the US. This practical book shows you how to apply the same response methodology to your own IT operation.
You’ll learn how IMS best practices for leading people and managing time apply directly to IT incidents where the stakes are high and outcomes are uncertain. This book provides use cases of some of the largest (and smallest) IT operations teams in the world. There is a better way to respond. You just found it.
- Assess your IT incident response with the PROCESS programmatic evaluation tool
- Get an overview of the IMS all-hazard, all-risk framework
- Understand the responsibilities of the Incident Commander
- Form a unified command structure for events that affect multiple business units
- Systematically evaluate what broke and how the incident team responded
Publisher resources
Table of contents
- Foreword
- Preface
- 1. Evaluating the Incident Response PROCESS
- 2. The Incident Management System (IMS)
- 3. The Incident Commander (IC)
- 4. Scaling the Incident Response
- 5. Unified Command (UC)
- 6. After Action Review (AAR)
- Index
Product information
- Title: Incident Management for Operations
- Author(s):
- Release date: July 2017
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781491917626
You might also like
book
The Staff Engineer's Path
For years, companies have rewarded their most effective engineers with management positions. But treating management as …
book
Building Microservices, 2nd Edition
As organizations shift from monolithic applications to smaller, self-contained microservices, distributed systems have become more fine-grained. …
book
The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks
This book is a comprehensive cyber security implementation manual which gives practical guidance on the individual …
book
Designing Data-Intensive Applications
Data is at the center of many challenges in system design today. Difficult issues need to …