logo
logo

The six stages of post-security incident grief avoidance

avatar
Charles Michels
img

Uni security manager offers his best half-dozen breach responses

AusCERT Audio Security and forensics man Ashley Deuble has outlined the six stages of good incident response that if followed could bring an enterprise in line with Fortune 50 best practice.

The Griffith University security manager says the steps of preparation; identification; containment; eradication; recovery, and lessons learned are core to help organisations successfully recover from data breaches.

"The state of incident response IR is not good," Deuble told the AusCERT security conference on the Gold Coast yesterday.

"But it's not all about IR - it's about detection, understanding what security means, and having budget, so you're local fish and chips shop is not going to have this."

Griffiths University security manager Ashley Deuble.

Throughout the incident response process, documentation is king; Deuble says security types should "document everything", answering questions of who, what, when, and how.

collect
0
avatar
Charles Michels
guide
Zupyak is a free content platform for publishing and discovering stories, software and startups.