incident response
Security: Is it Mission Impossible?
International intrigue. Rogue actors. Cybercrime. You might think I’m talking about Tom Cruise and his record-breaking sixth “Mission Impossible” movie. But I’m not. I’m talking about what happens to enterprises with a frequency that is a lot higher than most people suspect. Daily—sometimes hourly—t…
Putting the “Active” Back in Proactive Security: Tabletop Exercises
As security practitioners, we have the seemingly impossible task of defending an ever-changing environment. It seems like every time we get close to compliance, new vulnerabilities and threat vectors are discovered. So, we continually practice and plan, knowing that we have to be right all the time,…
The Importance of Logs
It’s funny how the world turns. I started off in security working for a bank. The model there was very much build it, break it, fix it with our Operational Security team aligning with platform and application support teams to build the projects the business wanted. Very soon after I joined it…
Top 5 Recommendations from Cisco Incident Response Engagements
Lately, there are days I wake up and find it hard to believe it’s been 3 years since we began our Incident Response (IR) practice within Cisco’s walls. Coming in on the ground floor of such a monumental and important offering to our customers gave us the unique opportunity to define and shape our pr…
Incident Response and General Data Protection Regulation
A new regulation is upon us. Set to take effect on May 25th, 2018, the General Data Protection Regulation (GDPR) is a new law implemented within the European Union (EU) to provide stronger protections for personally identifiable information collected, processed, and stored by business entities. In…
The Power of Logging in Incident Response
A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response reports. During incident response activities, this isn’t a phrase you want to see, since lack of logging…
Incident Response: Are you ready?
I am a big proponent of “what if” planning. Are you? I spin through what-if scenarios every day. Sometimes I ponder unlikely events, like: what would I do if I came across a bear while hiking in the forest? Or, a more positive but equally unlikely example: what if I won a million dollars? Either way…
Dissecting a Breach: The Process of Incident Response
On December 5, 2017, at 1 pm Eastern, Cisco Security Incident Response Service experts will present a webinar titled “Dissecting a Breach: An Incident Responder’s Perspective.” This webinar will describe how our team performs incident handling within the service and what you should expect during an…
Prevention or Cure? Focusing your Cybersecurity Efforts and Investments
An ounce of prevention is worth a pound of cure, so the saying goes. When it comes to protecting your organization against the imminent threat of a cyber attack, it’s essential to factor in both. Here’s why. Today’s hackers are motivated and more organized than ever. This past year has shown how vul…