Writing Your Computer Incident Response Plan
I’ve spent a fair amount of time discussing cyber-crime, due diligence, crisis, and planning. Now it’s time to pull up a chair and start writing your plan. As I explained earlier, Chapters 5 through 7 will review in detail a functioning data breach CIRP. Chapters 8 through 10 will do the same for a malware CIRP. In this chapter, you’ll learn about some fundamentals that will start you down the road of writing a good CIRP. I’ll provide examples for most of the topics discussed here in the chapters ...

Get The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.