Develop and Implement a Security Incident Management Program
If you're already a member, click here to log in.
Major Business Pain Points

Recommendations
Key Points

Approach
Methodology and Tools
Executive Brief
Read the concise Executive Brief to find out why you should develop and implement a security incident management program and review the methodology.
1. Prepare
Equip your organization for incident response with formal documentation of policies and processes.
2. Operate
Act with efficiency and effectiveness as new incidents are handled.

Security Incident Management Workflow: Credential Compromise (Visio)

Security Incident Management Workflow: Distributed Denial of Service (Visio)

Security Incident Management Workflow: Malware (Visio)

Security Incident Management Workflow: Malicious Email (Visio)

Security Incident Management Workflow: Ransomware (Visio)

Security Incident Management Workflow: Data Breach (Visio)

Security Incident Management Workflow: Third-Party Incident (Visio)
3. Maintain and optimize
Manage and improve the incident management process by tracking metrics, testing capabilities, and leveraging best practices.
The Security Incident Management Program methodology and tools are available to members of the Cyber Leadership Hub. Enter your details below to sign up for free membership of the Hub and download these resources.
If you're already a member, click here to log in or just download all content.