Cybersecurity Field Guide #2:

How to Survive
an Attack

 


Image
Field Guide 2 Mockup
August 18, 2020

Yes you can survive an attack. An effective Cybersecurity Incident Response Plan (CSIRP) will guide your organization’s management of a potential data breach in a way that supports rapid – yet still thoughtful – actions. You can maintain confidence, even in trying times, that operations can be restored to normal. Let’s crack open the hood on your CSIRP. And remember it’s only part of your larger security program and one that must be continually assessed. The result is much less overwhelming in times of chaos.

 

Like this guide? Here’s a link to view other guides.

 

 

Expect the Unexpected

 

Criminals. Nation States. Ransomware. Malicious Insiders. Malware. Phishing. The list goes on (and on and on).

 

But just because there are a lot of moving parts to cybersecurity doesn’t mean you can’t be prepared to respond to a data breach or other security incident.

 

If you’ve done your job correctly, you’ll never ask “now what?” when such an incident occurs, because you’ll already have a cybersecurity incident response plan in place that defines exactly what you need to do.

Image
Field Guide 2 Illustration Image

The Topics and Summaries

Optiv Field Guide Library

Image
Field Guide #1 Library Thumbnail

CYBERSECURITY FIELD GUIDE #1

Image
Field Guide #2 Library Thumbnail

CYBERSECURITY FIELD GUIDE #2

Image
Field Guide #3 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3

Image
Field Guide #3.5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #3.5

Image
Field Guide #4 Library Thumbnail

CYBERSECURITY FIELD GUIDE #4

Image
Field Guide #5 Library Thumbnail

CYBERSECURITY FIELD GUIDE #5

Image
Field Guide #6 Library Thumbnail

CYBERSECURITY FIELD GUIDE #6