Cybersecurity Field Guide #2:

How to Survive
an Attack

 


Image
Field Guide 2 Mockup
August 18, 2020

Yes you can survive an attack. An effective Cybersecurity Incident Response Plan (CSIRP) will guide your organization’s management of a potential data breach in a way that supports rapid – yet still thoughtful – actions. You can maintain confidence, even in trying times, that operations can be restored to normal. Let’s crack open the hood on your CSIRP. And remember it’s only part of your larger security program and one that must be continually assessed. The result is much less overwhelming in times of chaos.

 

Like this guide? Here’s a link to view other guides.

 

 

Expect the Unexpected

 

Criminals. Nation States. Ransomware. Malicious Insiders. Malware. Phishing. The list goes on (and on and on).

 

But just because there are a lot of moving parts to cybersecurity doesn’t mean you can’t be prepared to respond to a data breach or other security incident.

 

If you’ve done your job correctly, you’ll never ask “now what?” when such an incident occurs, because you’ll already have a cybersecurity incident response plan in place that defines exactly what you need to do.

Image
Field Guide 2 Illustration Image

The Topics and Summaries

Field Guide Library

Field Guide 01 Thumbnail Image

 

CYBERSECURITY FIELD GUIDE #1

 

What to Do When Everything Changes

 

COVID-19 meant an accelerated digital transformation (change, change and more change). But it won’t be the only thing that rattles your environment. Our first guide will help you navigate cybersecurity complexities in a world where innovation never stops, and small and large threats arise daily.

 

Field Guide 02 Thumbnail Image

 

CYBERSECURITY FIELD GUIDE #2

 

How to Survive an Attack

 

Looking to create an effective, comprehensive response to cyber attacks? Well, this is the Field Guide for you. It looks at how – from assembling your cross-functional team to tabletop exercises and war games – to mitigation if the unthinkable happens.

 

 
Field Guide 03 Thumbnail Image

 

CYBERSECURITY FIELD GUIDE #3

 

Get SASE to Accelerate Your Digital Transformation

 

Let's clear up SASE confusion. Optiv's third Cybersecurity Field Guide will help you better understand SASE, the promise of its future, its benefits and hurdles and includes a list of providers.

 

 
 
Field Guide 3.5 Thumbnail Image

 

CYBERSECURITY FIELD GUIDE #3.5

 

How to Effectively Implement and Operationalize SASE

 

This guide offers advice on how to prepare, plan, design, implement, operate and optimize your custom SASE plan.