CYBERSECURITY FIELD GUIDE #2.0

How to Survive an
Attack

 

Criminals. Nation States. Ransomware. Malicious Insiders. Malware. Phishing. Just because there are a lot of moving parts to cybersecurity doesn’t mean you can’t be prepared to respond to a data breach.

 

Image
field-guide-2-hero-mockup-image@2x
Image
Field Guide 2 Illustration Image

Expect the Unexpected

 

Criminals. Nation States. Ransomware. Malicious Insiders. Malware. Phishing. The list goes on (and on and on).

 

But just because there are a lot of moving parts to cybersecurity doesn’t mean you can’t be prepared to respond to a data breach or other security incident.

 

If you’ve done your job correctly, you’ll never ask “now what?” when such an incident occurs, because you’ll already have a cybersecurity incident response plan in place that defines exactly what you need to do.

The Topics and Summaries

Intro to Cybersecurity Threats

The CSIRP should establish an appropriate and effective process for different types of breaches. While minor breaches can be left to the discretion of the CSIRP manager, others may require a collaboration of the entire CSIRP team.

 

  • Assess. Collect. Analyze. Investigate. Remediate. 
  • Cybersecurity vs Physical Security.
September 15, 2021

Yes you can survive an attack. An effective Cybersecurity Incident Response Plan (CSIRP) will guide your organization’s management of a potential data breach in a way that supports rapid – yet still thoughtful – actions. You can maintain confidence, even in trying times, that operations can be restored to normal. Let’s crack open the hood on your CSIRP. And remember it’s only part of your larger security program and one that must be continually assessed. The result is much less overwhelming in times of chaos.

Optiv Field Guide Library

 

Designed with you in mind – with easily searchable content – these field guides will become a “go-to” reference for all your cybersecurity strategies and tactics. Each one is topic-specific and based on years of “been-there-done-that” research. Like what? From change management to getting ahead of ransomware to surviving an attack, implementing SASE or Zero Trust, it’s all here – with more to come!

 

Image
Field Guide #1 Library Thumbnail

CYBERSECURITY FIELD GUIDE #1

Image
Field Guide #2 Library Thumbnail

CYBERSECURITY FIELD GUIDE #2

Image
Field Guide #3 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3

Image
Field Guide #3.5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3.5

Image
Field Guide #4 Library Thumbnail

CYBERSECURITY FIELD GUIDE #4

Image
Field Guide #5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #5

Image
Field Guide #6 Library Thumbnail

CYBERSECURITY FIELD GUIDE #6