Top 10 Considerations For Incident Response. By: Tom Brennan, ProactiveRISK

Similar documents
Mandatory Reporting and Breach Notification Changes to PHIPA and what you need to know

Chapter 3: Business Continuity Management

The CARE CERTIFICATE. Duty of Care. What you need to know. Standard THE CARE CERTIFICATE WORKBOOK

Deliberate Dialogue Evaluating Teaching Effectiveness of a Patient Safety Communication Technique

After Action Report / Improvement Plan

Office of Inspector General

INDIA INDONESIA NEPAL SRI LANKA

Report of the Auditor General to the Nova Scotia House of Assembly. December Independence Integrity Impact

PLANNING DRILLS FOR HEALTHCARE EMERGENCY AND INCIDENT PREPAREDNESS AND TRAINING

Safeguarding Healthcare Information. By:

After Action Report / Improvement Plan

INCIDENT COMMAND SYSTEM MULTI-CASUALTY

Crisis Response Planning

Preparing for the Unthinkable

HEALTH AND SAFETY POLICY

Recent Veterans of Major EMR Launches Share Insights on Keys to a Robust Go-Live Command Center

REGULATORY DOCUMENTS. The main classes of regulatory documents developed by the CNSC are:

Information Technology Incident Management

SCHOOL CRISIS, EMERGENCY MANAGEMENT, AND MEDICAL EMERGENCY RESPONSE PLANS

After Action Report / Improvement Plan

Department of Defense DIRECTIVE

FOUR TIPS: THE INVISIBLE IMPACT OF CREDENTIALING

SIMULATION FOR OPTIMAL UTILIZATION OF HUMAN RESOURCES IN SURGICAL INSTRUMENTS DISTRIBUTION IN HOSPITALS

CIP Cyber Security Incident Reporting and Response Planning

The 2018 edition is under review and will be available in the near future. G.M. Janowski Associate Provost 21-Mar-18

Chapter 9 Legal Aspects of Health Information Management

EMERGENCY RESPONSE FOR SCHOOLS Checklists

Annual Unit Inspection Results Item 7 March 3, 2016 Resident Services Committee

Third Party Trust Manage your outsourcing arrangements

JAN ceo B 6

A Deep Dive into the Privacy Landscape

POSITION DESCRIPTION

Emergency Management Element. CMS Rule for. HRSA Form 10 HRSA PIN Joint Commission NIMS OSHA Best Practices. Emergency

Special Events / Mass Gathering

What to do When Faced With a Privacy Breach: Guidelines for the Health Sector. ANN CAVOUKIAN, Ph.D. COMMISSIONER

During pre-briefing, you will be assigned one of these roles according to the description below to participate in the simulation as a nurse.

PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 5.26

IACUC Policy 09: Researcher Non-Compliance

Investigation Report H2017-IR-02 Investigation into multiple alleged unauthorized accesses of health information at South Health Campus

SCHOOL SAFETY SUPERVISOR

Audit Report Grant Closure Processes Follow-up Review

Occupational Health and Safety Policy

OREGON HEALTH AUTHORITY, DIVISION OF MEDICAL ASSISTANCE PROGRAMS

Minutes Board of Trustees

Statement of Guidance: Outsourcing Regulated Entities

Report No. D September 25, Controls Over Information Contained in BlackBerry Devices Used Within DoD

ASX CLEAR OPERATING RULES Guidance Note 9

Disagreement between agencies about threshold judgements. Disagreement within agencies about the appropriate course of safeguarding action

STATEMENT OF HEALTH AND SAFETY POLICY

Western Michigan University. Training Program

Development of an Emergency Preparedness Plan for a Bibb County, Georgia Faith Based. Organization

Recommendation 029 E Best Practice for Investigation and Inquiry into HSE Incidents

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION

Kings Crisis and Critical Incident Management Policy

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 9

Incident Planning Guide: Mass Casualty Incident Page 1

INTERNAL AUDIT DIVISION REPORT 2017/090. Audit of military patrolling operations in United Nations Interim Force in Lebanon

GAO INDUSTRIAL SECURITY. DOD Cannot Provide Adequate Assurances That Its Oversight Ensures the Protection of Classified Information

THE NATIONAL DECLASSIFICATION. Releasing What We Can, Protecting What We Must

Nuclear Security Legal and Regulatory Framework in UAE. Saif Al Kaabi Director, Nuclear Security Department

Towards Sourcing Excellence

Hospital Care and Trauma Management Nakhon Tipsunthonsak Witaya Chadbunchachai Trauma Center Khonkaen, Thailand

Code of Governance of Irish Institutes of Technology. Annual Governance Statement and Statement of Internal Control - reporting arrangements to HEA

Proposal for a CG Educational Content Online Submission and Reviewing System

PRIVACY BREACH GUIDELINES

0 Smithsonian Institution

North Carolina Department of Commerce Small Cities Community Development Block Grant Program (CDBG)

Information Security Emergency Planning Student Guide Student Guide. Course: Information Security Emergency Planning. Introduction

CITY OF SAULT STE. MARIE EMERGENCY RESPONSE PLAN

Data Breach Notification Guide Policies and Procedures

Responding to Healthcare Industry Regulations Date: May 9, 2013

Social Engineering & How to Counteract Advanced Attacks. Joe Ferrara, President and CEO Wombat Security Technologies, Inc.

Outsourcing Guidelines. for Financial Institutions DRAFT (FOR CONSULTATION)

PMA Business Continuity Plan

AUXILIARY ORGANIZATIONS CALIFORNIA STATE UNIVERSITY, EAST BAY. Audit Report June 18, 2014

Commack School District District-Wide. Emergency Response Plan

Report of the Information & Privacy Commissioner/Ontario. Review of the Cardiac Care Network of Ontario (CCN):

RJC Trainers Handbook

Risk Management Fundamentals

Emergency Preparedness Near Nuclear Power Plants

The Professional Advantage

GLOBAL MARKET ACCELERATION FUND (GMAF) Submission Guidelines

Self-Assessment Questionnaire: Establishing a Health Information Technology Safety Program

Understanding Diversion in the Pharmacy Kimberly S. New JD BSN RN

Michigan. Citations for state laws and regulations regarding ASC requirements and abortion care

REPORT 2015/042 INTERNAL AUDIT DIVISION. Audit of the child protection programme in the African Union-United Nations Hybrid Operation in Darfur

Reviewing Methods Used in Patient Safety Research: Advantages and Disadvantages. This SPSRN work is funded by

Public Summary of KPMG PRI Certification Processes

HIPAA THE PRIVACY RULE

Department of Defense DIRECTIVE

Guidance on the Delivery of Medicines Dispensed on Foot of a Prescription from a Retail Pharmacy Business

After Action Report / Improvement Plan. After Action Report Improvement Plan

Department of Defense INSTRUCTION

The standard questionnaire prepared by the Paris MoU for use by PSCOs during the CIC can be found reproduced on page 3 of this document.

Meeting of Governing Body

Recommendations on outsourcing to cloud service providers (EBA/REC/2017/03)

Quality Assurance Committee Annual Report April 2017 March 2018

A Privacy Compliance Checklist: Organizing for Privacy Management

MODEL POLICY - EMERGENCY PLAN FOR SCHOOL NURSES

Transcription:

Top 10 Considerations For Incident Response. By: Tom Brennan, ProactiveRISK

Table of Contents. 1. Introduction. 2. 3. 4. 5. 6. Consideration #1: Audit and Due Diligence. Consideration #2: Create a Response Team. Consideration #3: Create a Documented Incident Response Plan. Consideration #4: Identify your Triggers and Indicators. Consideration #5: Investigate the Problem.

Table of Contents. 7. Consideration #6: Triage and Mitigation. 8. Consideration #7: Recovery. 9. Consideration #8: Documentation and Reporting. 10. Consideration #9: Process Review. 11. Consideration #10: Practice, Practice, Practice. 12. Conclusion.

1.Introduction.

A Security incident is an identified occurrence or weakness indicating a possible breach of security policies or failure of safeguards, or a previously unknown situation which may be security relevant.[1] Incident Response is the reaction to an identified occurrence whereby responders classify an incident, investigate & contain the incident.

Why is Incident Response Important? The answer is straightforward. Any challenge or problem which is not properly contained and handled can and will spiral into bigger problems that can eventually lead to the total collapse of the system.

One of the biggest questions that must be answered by companies or Incident Response Managers is: Where do we start from?

Consideration #1: Audit and Due Diligence.

Performing an audit will let you know how well prepared the organization is for Incident Response in terms of:. PEOPLE PROCESS EQUIPMENT & MATERIALS.

Consideration #2: Create a Response Team.

Preventing and managing attacks or incidents that can occur without prior notice is best managed by experts that belong to an Incident Response team. Some important things to note when creating an Incident Response Team. Ensure that you have a competent Team Leader who is in charge and has a clear chain of. command. Document the roles and responsibilities of the team members and communicate this clearly to all relevant stakeholders.

Consideration #3: Create a Documented Incident Response Plan.

An organization should have a well-documented Incident Response plan that would guide the Incident Response Team during an incident.. A comprehensive plan at minimum, should cover Roles and Responsibilities, Investigation, Triage and Mitigation, Recovery, and Documentation process.

Consideration #4: Identify your Triggers and Indicators.

What would be categorized as an incident at your organization? How important or weighty are the factors that would trigger an incident? You need to clearly define what can trigger an incident. Some of these events include: Loss or theft of Equipment.. Loss or theft of Information. Attempts to gain unauthorized access to data, computer or information storage device.?

Consideration #5: Investigate the Problem.

A thorough investigation will require input from the Incident Response Team and might require input from external resources. The investigation will document the incident details,. including what to look for, who to involve, and how to document what is found.

Consideration #6: Triage and Mitigation.

Investigation leads to the triage & resolution process. As the team identifies potential exposure, they should plan & execute effective mitigation accordingly. In summary, the triage process should cater for the following activities:. Classification of the Incident. Incident Prioritization. Assigning specific tasks to specific people.

Consideration #7: Recovery.

Recovery is a significant step for restoring whatever services or materials might have been affected during an incident. The recovery step is the transition from active incident to standard monitoring.. The recovery procedure should include the steps for transition given the specifics of the firm s environment and approach.

Consideration #8: Documentation and Reporting.

. Reporting and documentation is a critical action that will always occur before, during and after Incident Response. A comprehensive incident report is required in keeping with best practices and with the Incident Response plan. The type of reports that might be required might vary but should help in managing and reviewing incidents satisfactorily.

Consideration #9: Process Review.

. It is imperative to continuously monitor an incident and the workload/performance of the team or Incident Handler. Process Review can help you to answer the following: Should I increase or decrease the number of Incident Handlers? Do we need to develop automated procedures for Incident Handling?. What risks did we identify during the incident that needs to be followed up for action and monitored closely???? X X X???? X X X??

Consideration #10: Practice, Practice, Practice.

. Do not wait until an incident occurs before you put your team to work. It is important that you Incident Response Team understand how important mock drills and practice are to the firm. Sometimes you can practice the organization s plan by simulating a live scenario. This test can be as simple as dropping a thumb drive on the floor of the office and seeing what happens, to simulating a data breach or phishing attack. Practice Practice Practice

Conclusion.

. Incident Response cuts across the whole organization and should not just be restricted to the IT unit or particular units. It should be clearly communicated that an organization s service delivery can be endangered when incidents occur. Incident Response Team has the mandate to prevent, handle, resolve and adequately document incidents that may arise. Incident Recovery is a significant tool of overall governance and to have it is a necessity. This fact is acknowledged and supported in the ISO 27001 security standards and in frameworks such as ITIL and COBIT.

Questions? Tom Brennan tomb@proactiverisk.com