Writing Your Computer Incident Response Plan
I’ve spent a fair amount of time discussing cyber-crime, due diligence, crisis, and planning. Now it’s time to pull up a chair and start writing your plan. As I explained earlier, Chapters 5 through 7 will review in detail a functioning data breach CIRP. Chapters 8 through 10 will do the same for a malware CIRP. In this chapter, you’ll learn about some fundamentals that will start you down the road of writing a good CIRP. I’ll provide examples for most of the topics discussed here in the chapters ...

Get The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.