There is a large gap in understanding on Incident Response preparedness within organisations. That’s a problem given that in essence, incidents are the reason why we all (have to) practice cybersecurity.
But what does preparation for Incident Response actually involve? Yes… IR plans, playbooks and workshops… what about on the technical side?
Responders and investigators have a wide skillset and toolset to facilitate remediation and forensics, but major elements of response hinge on what your organisation has enabled up until the point we’re engaged.
By proactively discovering and removing the hindrances that will be encountered by your organisation and response experts, we can drastically decrease impact by enabling efficient remediation, in-depth investigation and resilience.
We’ll take a look at what this involves and the risks it eliminates
Grant heads up SiegeBrake, a specialist DFIR and resilience consultancy, that’s relied upon by organisations for incident response, investigations and directing their journey to become cyber resilient, including Managed Detection and Response, Threat Modelling and Incident Readiness
Grant has over a decade of experience Digital Forensics, Incident Response and Resiliency consulting and is still loving it. He previously worked for consultancies including IBM CERT, AccessData and Content Security, leading breach response and penetration testing teams.
Outside of work he teaches Japanese Jiu-Jitsu and is fortunate enough to have travelled extensively having visited over 170 countries.