Respond
Once an organisation has detected a compromise, the most effective way to minimise overall damage is to implement an effective response strategy. The longer an organisation takes to respond the greater the risk to reputation as well as grater financial and regulatory impacts.
The Ability of an organisation to respond effectively, decisively and quickly comes down to how well the response process is developed.
How should we respond to incidents?
Recent legislation has outlined data breach reporting requirements, as well as cyber incident reporting, Does the organisation know its legal requirements?
Do the staff involved in the response know how to maintain evidence while performing the response?
Do Staff know who and how to contact the appropriate people during an incident?
Does the organisation have an effective plan to manage and control the impacts?
The Response function focuses on ensuring that when an incident has occurred the organisation is able to respond in an effective, timely and responsible manner.
Aims of a strong response process.
- Ensuring Response Planning process are executed during and after an incident
- Managing Communications during and after an event with stakeholders, law enforcement, external stakeholders as appropriate
- Analysis is conducted to ensure effective response and support recovery activities including forensic analysis, and determining the impact of incidents
- Mitigation activities are performed to prevent expansion of an event and to resolve the incident
- The organization implements Improvements by incorporating lessons learned from current and previous detection / response activities
The ACSC Essential 8
Covering the 8 most effective areas your organisation can target to minimise potential cyber security incidents, Have us perform an Essential 8 Maturity Assessment on your organisation and get a head start on defending your organisation.