SlideShare une entreprise Scribd logo
1  sur  1
Télécharger pour lire hors ligne
We should not use the expectation of
compromise to avoid taking the
necessary steps to defend against attacks,
as to fail to do so may make the frequency
and severity higher than acceptable or
survivable.
As well as trying to prevent and protect,
we must prepare – so that we are able to
respond and recover.
As much as we think we can envisage
the sorts of ills that may befall us, it is
better to have an organisational structure
and support arrangements that can cope
with a variety of impacts, so that from
whatever direction disaster strikes there
is a means of response covering physical,
personnel, process and technology.
Incident response plans, forensic
readiness plans, contingency plans,
disaster recovery plans, business
continuity plans, civil contingency plans,
and all other such good stuff are of no use
without ensuring that they are reviewed
and tested with all the parties who
would contribute to enacting them when
required.
As well as having regularly tested
and revised plans available, also having
contracts and arrangements in place
for forensic response, communications,
recovery sites, backup equipment and
data, helps provide the means of response
and recovery in a timely and more cost
effective manner.
Throughout, good communications with
INFORMATION SECURITY
all key stakeholders is paramount.
Breach notification requirements, and
swingeing regulatory fines, makes it even
more prudent to both build defences, to
prevent and detect attack, and prepare to
respond to breaches – only then can we
manage the impact and recover.
Although organisations and individuals understand the need to build
and maintain defences against evolving and persistent attacks, we
should also prepare for the inevitable. The odds have always been
stacked against the defenders, and attackers continue to grow, says
Gareth Niblett, Chair, BCS Information Security Specialist Group.
Information Security Specialist
Group (ISSG):
www.bcs-issg.org.uk
Information Risk Management and
Assurance Specialist Group:
www.bcs.org/groups/irma
BCS Security Community of
Expertise (SCoE):
www.bcs.org/securitycommunity
FURTHER INFORMATION
doi:10.1093/itnow/bww008©2016TheBritishComputerSocietyImage:Thinkstock
CYBER
RESPONSE
March 2016 ITNOW 21

Contenu connexe

Tendances

011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rsRichard Smiraldi
 
The Life of the National Incident Management System
The Life of the National Incident Management SystemThe Life of the National Incident Management System
The Life of the National Incident Management SystemKarl Schmitt
 
EINTROEVM - Contingency planning
EINTROEVM - Contingency planningEINTROEVM - Contingency planning
EINTROEVM - Contingency planningMervyn Maico Aldana
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtableJunSeok Seo
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4Robin Patras
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinSuzanne Hartin
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksPhil Huggins FBCS CITP
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaDale Butler
 

Tendances (12)

011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs011918 executive breach_simulation_customer_fac_rs
011918 executive breach_simulation_customer_fac_rs
 
The Life of the National Incident Management System
The Life of the National Incident Management SystemThe Life of the National Incident Management System
The Life of the National Incident Management System
 
EINTROEVM - Contingency planning
EINTROEVM - Contingency planningEINTROEVM - Contingency planning
EINTROEVM - Contingency planning
 
201408 fire eye korea user event press roundtable
201408 fire eye korea user event   press roundtable201408 fire eye korea user event   press roundtable
201408 fire eye korea user event press roundtable
 
Creating a security culture 4
Creating a security culture 4Creating a security culture 4
Creating a security culture 4
 
Don't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne HartinDon't Overthink Risk Management by Suzanne Hartin
Don't Overthink Risk Management by Suzanne Hartin
 
Behavioral Threat Assessment on Campus: What You Need to Know
Behavioral Threat Assessment on Campus: What You Need to KnowBehavioral Threat Assessment on Campus: What You Need to Know
Behavioral Threat Assessment on Campus: What You Need to Know
 
Risk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In NepalRisk Based Approach In cyber Security In Nepal
Risk Based Approach In cyber Security In Nepal
 
Cyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber ShocksCyber Resilience: Managing Cyber Shocks
Cyber Resilience: Managing Cyber Shocks
 
What cybersecurity risk management entails
What cybersecurity risk management entailsWhat cybersecurity risk management entails
What cybersecurity risk management entails
 
SMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North AmericaSMi Group's Oil and Gas Cyber Security North America
SMi Group's Oil and Gas Cyber Security North America
 
Sports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best PracticesSports and Special Event Security Planning: Best Practices
Sports and Special Event Security Planning: Best Practices
 

En vedette

Closing the communication and collaboration gap
Closing the communication and collaboration gapClosing the communication and collaboration gap
Closing the communication and collaboration gapCIPR Inside
 
Basic Solutions Corp.
Basic Solutions Corp. Basic Solutions Corp.
Basic Solutions Corp. Shiv Singh
 
體能訓練建議
體能訓練建議體能訓練建議
體能訓練建議tarokoProj
 
mymediaplanning12
mymediaplanning12mymediaplanning12
mymediaplanning12Trampezium
 
arjunprasad tiwari Member Certificate 11-11-2015
arjunprasad tiwari  Member Certificate  11-11-2015arjunprasad tiwari  Member Certificate  11-11-2015
arjunprasad tiwari Member Certificate 11-11-2015arjunprasad tiwari
 
Tabla gesto técnico
Tabla gesto técnicoTabla gesto técnico
Tabla gesto técnicoKarla Dávila
 
Cop15 12 11 09 Ceswan Bellona Room 7
Cop15 12 11 09 Ceswan Bellona Room 7Cop15 12 11 09 Ceswan Bellona Room 7
Cop15 12 11 09 Ceswan Bellona Room 7CESwan
 
Bill david-cracking-ammonia-nh3fa2016 h2 storage
Bill david-cracking-ammonia-nh3fa2016 h2 storageBill david-cracking-ammonia-nh3fa2016 h2 storage
Bill david-cracking-ammonia-nh3fa2016 h2 storageSteve Wittrig
 
Transmission Electron Microscope (TEM) for research (Full version)
Transmission Electron Microscope (TEM) for research (Full version)Transmission Electron Microscope (TEM) for research (Full version)
Transmission Electron Microscope (TEM) for research (Full version)Mohit Rajput
 
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalement
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalementQuels sont les frais de séjour à l'étranger qui sont déductibles fiscalement
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalementJérôme Havet
 

En vedette (20)

Closing the communication and collaboration gap
Closing the communication and collaboration gapClosing the communication and collaboration gap
Closing the communication and collaboration gap
 
Basic Solutions Corp.
Basic Solutions Corp. Basic Solutions Corp.
Basic Solutions Corp.
 
體能訓練建議
體能訓練建議體能訓練建議
體能訓練建議
 
mymediaplanning12
mymediaplanning12mymediaplanning12
mymediaplanning12
 
bxbinserts[8]
bxbinserts[8]bxbinserts[8]
bxbinserts[8]
 
arjunprasad tiwari Member Certificate 11-11-2015
arjunprasad tiwari  Member Certificate  11-11-2015arjunprasad tiwari  Member Certificate  11-11-2015
arjunprasad tiwari Member Certificate 11-11-2015
 
Tabla gesto técnico
Tabla gesto técnicoTabla gesto técnico
Tabla gesto técnico
 
Cop15 12 11 09 Ceswan Bellona Room 7
Cop15 12 11 09 Ceswan Bellona Room 7Cop15 12 11 09 Ceswan Bellona Room 7
Cop15 12 11 09 Ceswan Bellona Room 7
 
Horario de clases
Horario de clases Horario de clases
Horario de clases
 
Závěrečný úkol do KPI
Závěrečný úkol do KPIZávěrečný úkol do KPI
Závěrečný úkol do KPI
 
Matt Kendall - NWC - Presentation UNAA Corporate Water Valuation Seminar 29.0...
Matt Kendall - NWC - Presentation UNAA Corporate Water Valuation Seminar 29.0...Matt Kendall - NWC - Presentation UNAA Corporate Water Valuation Seminar 29.0...
Matt Kendall - NWC - Presentation UNAA Corporate Water Valuation Seminar 29.0...
 
Jimmys
JimmysJimmys
Jimmys
 
Dr Simon Bradshaw - Oxfam Australia - Financing Adaptation Presentation 29102012
Dr Simon Bradshaw - Oxfam Australia - Financing Adaptation Presentation 29102012Dr Simon Bradshaw - Oxfam Australia - Financing Adaptation Presentation 29102012
Dr Simon Bradshaw - Oxfam Australia - Financing Adaptation Presentation 29102012
 
Avast-NOAH12 London
Avast-NOAH12 LondonAvast-NOAH12 London
Avast-NOAH12 London
 
Bill david-cracking-ammonia-nh3fa2016 h2 storage
Bill david-cracking-ammonia-nh3fa2016 h2 storageBill david-cracking-ammonia-nh3fa2016 h2 storage
Bill david-cracking-ammonia-nh3fa2016 h2 storage
 
Evolution of Values
Evolution of ValuesEvolution of Values
Evolution of Values
 
E-Cristal4
E-Cristal4E-Cristal4
E-Cristal4
 
Transmission Electron Microscope (TEM) for research (Full version)
Transmission Electron Microscope (TEM) for research (Full version)Transmission Electron Microscope (TEM) for research (Full version)
Transmission Electron Microscope (TEM) for research (Full version)
 
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalement
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalementQuels sont les frais de séjour à l'étranger qui sont déductibles fiscalement
Quels sont les frais de séjour à l'étranger qui sont déductibles fiscalement
 
Tfm ppt
Tfm pptTfm ppt
Tfm ppt
 

Similaire à BCS ITNow 201603 - Cyber Response

Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing EventsMark Bennett
 
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docxfelicidaddinwoodie
 
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...MagnumSecurity1
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdfDaviesParker
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfHeliosEvent
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCiente
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...Symantec
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docxinfantsuk
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecCheapSSLsecurity
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyRapidSSLOnline.com
 
Crisis Mastery: Effective Emergency Response Strategies
Crisis Mastery: Effective Emergency Response StrategiesCrisis Mastery: Effective Emergency Response Strategies
Crisis Mastery: Effective Emergency Response StrategiesI-Pix Technologies
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIMAnton Chuvakin
 
Humanitarian task and its importance
Humanitarian task and its importanceHumanitarian task and its importance
Humanitarian task and its importanceRokonuzzaman Rony
 
Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxmattjtoni51554
 
85Operations Security, Site Security, and Terrorism In.docx
  85Operations Security, Site Security, and Terrorism In.docx  85Operations Security, Site Security, and Terrorism In.docx
85Operations Security, Site Security, and Terrorism In.docxShiraPrater50
 

Similaire à BCS ITNow 201603 - Cyber Response (20)

Risk insights Planning and Managing Events
Risk insights Planning and Managing EventsRisk insights Planning and Managing Events
Risk insights Planning and Managing Events
 
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
1Running head DISASTER RECOVERY PLAN2DISASTER RECOVERY PLAN.docx
 
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...
From Risk Assessment to Crisis Management: A Comprehensive Guide to Event Sec...
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Crisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdfCrisis Management for Events How to Handle Unexpected Challenges.pdf
Crisis Management for Events How to Handle Unexpected Challenges.pdf
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Cybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdfCybersecurity Incident Response Planning.pdf
Cybersecurity Incident Response Planning.pdf
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Managing Vulnerability SEC400 Managing.docx
Managing Vulnerability     SEC400 Managing.docxManaging Vulnerability     SEC400 Managing.docx
Managing Vulnerability SEC400 Managing.docx
 
Future Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - SymantecFuture Cyber Attacks & Solution - Symantec
Future Cyber Attacks & Solution - Symantec
 
Preparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategyPreparing for future attacks - the right security strategy
Preparing for future attacks - the right security strategy
 
Crisis Mastery: Effective Emergency Response Strategies
Crisis Mastery: Effective Emergency Response StrategiesCrisis Mastery: Effective Emergency Response Strategies
Crisis Mastery: Effective Emergency Response Strategies
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
 
Humanitarian task and its importance
Humanitarian task and its importanceHumanitarian task and its importance
Humanitarian task and its importance
 
Please respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docxPlease respond to the student as if you were another student.5.docx
Please respond to the student as if you were another student.5.docx
 
85Operations Security, Site Security, and Terrorism In.docx
  85Operations Security, Site Security, and Terrorism In.docx  85Operations Security, Site Security, and Terrorism In.docx
85Operations Security, Site Security, and Terrorism In.docx
 

Plus de Gareth Niblett

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Gareth Niblett
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsGareth Niblett
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsGareth Niblett
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureGareth Niblett
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyGareth Niblett
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityGareth Niblett
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsGareth Niblett
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionGareth Niblett
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessGareth Niblett
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnGareth Niblett
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletGareth Niblett
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityGareth Niblett
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationGareth Niblett
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and PracticeGareth Niblett
 

Plus de Gareth Niblett (16)

Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)Preventing Predictable Problems (Possibly)
Preventing Predictable Problems (Possibly)
 
BCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest ThreatsBCS ITNow 201609 - Defining the Latest Threats
BCS ITNow 201609 - Defining the Latest Threats
 
BCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider ThreatsBCS ITNow 201606 - Insider Threats
BCS ITNow 201606 - Insider Threats
 
BCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, SecureBCS ITNow 201303 - Cope, Educate, Secure
BCS ITNow 201303 - Cope, Educate, Secure
 
BCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share SecurelyBCS ITNow 201306 - Share Securely
BCS ITNow 201306 - Share Securely
 
BCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic SecurityBCS ITNow 201309 - Holistic Security
BCS ITNow 201309 - Holistic Security
 
BCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 ThreatsBCS ITNow 201312 - 2014 Threats
BCS ITNow 201312 - 2014 Threats
 
BCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss PreventionBCS ITNow 201403 - Data Loss Prevention
BCS ITNow 201403 - Data Loss Prevention
 
BCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk BusinessBCS ITNow 201406 - The Risk Business
BCS ITNow 201406 - The Risk Business
 
BCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going OnBCS ITNow 201409 - What's Going On
BCS ITNow 201409 - What's Going On
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
BCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver BulletBCS ITNow 201506 - Silver Bullet
BCS ITNow 201506 - Silver Bullet
 
BCS ITNow 201509 - Identity
BCS ITNow 201509 - IdentityBCS ITNow 201509 - Identity
BCS ITNow 201509 - Identity
 
BCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber InnovationBCS ITNow 201512 - Cyber Innovation
BCS ITNow 201512 - Cyber Innovation
 
Why the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
 
RIPA: Perception and Practice
RIPA: Perception and PracticeRIPA: Perception and Practice
RIPA: Perception and Practice
 

Dernier

Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样ayvbos
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiMonica Sydney
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...gajnagarg
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理F
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...kumargunjan9515
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsPriya Reddy
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 

Dernier (20)

Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
一比一原版(Flinders毕业证书)弗林德斯大学毕业证原件一模一样
 
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls in Anand Vihar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu DhabiAbu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
Abu Dhabi Escorts Service 0508644382 Escorts in Abu Dhabi
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理一比一原版奥兹学院毕业证如何办理
一比一原版奥兹学院毕业证如何办理
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...Local Call Girls in Seoni  9332606886 HOT & SEXY Models beautiful and charmin...
Local Call Girls in Seoni 9332606886 HOT & SEXY Models beautiful and charmin...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call GirlsMira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
Mira Road Housewife Call Girls 07506202331, Nalasopara Call Girls
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 

BCS ITNow 201603 - Cyber Response

  • 1. We should not use the expectation of compromise to avoid taking the necessary steps to defend against attacks, as to fail to do so may make the frequency and severity higher than acceptable or survivable. As well as trying to prevent and protect, we must prepare – so that we are able to respond and recover. As much as we think we can envisage the sorts of ills that may befall us, it is better to have an organisational structure and support arrangements that can cope with a variety of impacts, so that from whatever direction disaster strikes there is a means of response covering physical, personnel, process and technology. Incident response plans, forensic readiness plans, contingency plans, disaster recovery plans, business continuity plans, civil contingency plans, and all other such good stuff are of no use without ensuring that they are reviewed and tested with all the parties who would contribute to enacting them when required. As well as having regularly tested and revised plans available, also having contracts and arrangements in place for forensic response, communications, recovery sites, backup equipment and data, helps provide the means of response and recovery in a timely and more cost effective manner. Throughout, good communications with INFORMATION SECURITY all key stakeholders is paramount. Breach notification requirements, and swingeing regulatory fines, makes it even more prudent to both build defences, to prevent and detect attack, and prepare to respond to breaches – only then can we manage the impact and recover. Although organisations and individuals understand the need to build and maintain defences against evolving and persistent attacks, we should also prepare for the inevitable. The odds have always been stacked against the defenders, and attackers continue to grow, says Gareth Niblett, Chair, BCS Information Security Specialist Group. Information Security Specialist Group (ISSG): www.bcs-issg.org.uk Information Risk Management and Assurance Specialist Group: www.bcs.org/groups/irma BCS Security Community of Expertise (SCoE): www.bcs.org/securitycommunity FURTHER INFORMATION doi:10.1093/itnow/bww008©2016TheBritishComputerSocietyImage:Thinkstock CYBER RESPONSE March 2016 ITNOW 21