SlideShare a Scribd company logo
Incident Response
Phasesof IncidentResponse
ZacheryS.Mitcham,MSA
AboutMe
● Zachery S. Mitcham
● 38 years of Information Security experience
beginning as a U.S. Army Officer
● MSA-Administration, Certified CISO; Certified
Computer Security Incident Handler; Graduate
Certificate-Harvard University
● I am one of thirteen children
● Feel free to view my linkedin profile at:
https://www.linkedin.com/in/zmitcham/
Prerequisites
There are no formal prerequisites for this class however you will
benefit greatly by previewing the NIST 800 special publication 61
accessible at the following link:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-
61r2.pdf
Supplementary Materials
We will use NIST 800 sp 61 as the basis for our discussion. Again,
you may download it at the following link:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-6
1r2.pdf
Target Audience
● This class is primarily intended for those that are in need of
an informational overview on how to respond to information
security incidents or have a responsibility for doing so.
● It will also assist with your preparation for a Computer
Security Incident Handling certification
Learning Objectives
❖ Upon completion of this class you will be able to:
➢ Identify the phases of incident response
➢ Create a Computer Security Incident Response Plan
➢ Identify composition of key personnel necessary to serve as
incident responders.
❖ This class will cover the phases of incident handling and how each
phase relates to responding to information security incidents.
Definitions
❖ The mission of information security professionals is to safeguard the
confidentiality, integrity and availability of data that is processed, stored
and transmitted over a technological network whether it is at rest or in
flight.
❖ Security Incident - any situation, condition, or circumstance whereby
security control measures placed within information systems are
circumvented.
❖ Computer Security Incident Response Team (CSIRT)- An organization or
team that provides services and support to a defined constituency for
preventing, handling, and responding to computer security incidents.
Phases of IncidentResponse
❖ Preparation
❖ Detection andAnalysis
❖ Containment, Eradication and Recovery
❖ Post IncidentActivity
Incident Handling Activities
Triage – the actions taken to categorize, prioritize, and assign events and incidents.
Detecting and Reporting – the ability to receive and review event information,
incident reports, and alerts.
Analysis – the attempt to determine what has happened, what impact, threat, or
damage resulted, and what recovery or mitigation steps should be followed. This can
include characterizing new threats that may impact the infrastructure.
Incident response – the actions taken to resolve or mitigate an incident, coordinate
and disseminate information, and implement follow-up strategies to prevent the
incident from happening again.
Preparation Phase
Adequate systems, resources and tools emplaced to respond to the
incident
Incident Response Plan development
Incident Response Team Development
Contact information for team members, War room, Evidence gathering
Detection and Analysis Phase
Identification and assess magnitude of the threat
(IDS/IPS, Security Information and Event Management (SIEM),A/V
tools-System Center Configuration Manager(SCCM), system logs)
Containment, Eradication and Recovery
Prevention of threat propagation, remediation and operational or system
restoration.
Post Incident Activity
Post Mortem debriefing, Lessons Learned, Documentation and Reporting.
Quiz
What is the first phase of incident handling?
A) Panic phase
B) Priority Information Requirements phase
C) Paranoia phase
D) Preparation phase
Answer D - The Preparation Phase-is the most important phase.
Without it your response will be inadequate. Always remember to
“Sweat more in training and bleed less in war!”
Quiz
What is Triage?
A) Remediation of issues causing the incident
B) Artifacts analysis
C) Prioritizing events
D) Reporting the incident to law enforcement
Answer C - Prioritizing. Triage are the actions taken to categorize,
prioritize, and assign events and incidents.
Summary
● During this class, we discussed:
❖ The different phases of incident response and how each phase
relates to responding to information security incidents
❖ Creation of a Computer Security Incident Response Plan
❖ Identification of key personnel necessary to serve as incident
responders.
● Looking forward, our next class will cover the individual phases of
incident response in depth

More Related Content

PPT
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
PDF
Overview of the Cyber Kill Chain [TM]
PDF
Cyber Kill Chain Deck for General Audience
PDF
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
PDF
Corporate threat vector and landscape
PDF
Cyber Kill Chain vs. Cyber Criminals
PDF
Defense In Depth Using NIST 800-30
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Overview of the Cyber Kill Chain [TM]
Cyber Kill Chain Deck for General Audience
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Corporate threat vector and landscape
Cyber Kill Chain vs. Cyber Criminals
Defense In Depth Using NIST 800-30

What's hot (20)

PDF
Understanding Cyber Kill Chain and OODA loop
PPTX
Application Security Architecture and Threat Modelling
PPTX
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
PPTX
Understanding Application Threat Modelling & Architecture
PDF
Proactive cyber defence through adversary emulation for improving your securi...
PDF
From Business Architecture to Security Architecture
PDF
Addressing the cyber kill chain
DOCX
Dhishant -Latest Resume
PDF
Cisco Addresses the Full Attack Continuum
PPTX
kill-chain-presentation-v3
PPTX
DC970 Presents: Defense in Depth
PDF
Advanced persistent threat (apt) & data centric audit and protection (dacp)
PDF
The State of Threat Detection 2019
PDF
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
PDF
Talos threat-intelligence
PPTX
The Four Types of Threat Detection and Use Cases in Industrial Security
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
PPTX
Ransomware Detection: Don’t Pay Up. Backup.
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Trisis in Perspective: Implications for ICS Defenders
Understanding Cyber Kill Chain and OODA loop
Application Security Architecture and Threat Modelling
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
Understanding Application Threat Modelling & Architecture
Proactive cyber defence through adversary emulation for improving your securi...
From Business Architecture to Security Architecture
Addressing the cyber kill chain
Dhishant -Latest Resume
Cisco Addresses the Full Attack Continuum
kill-chain-presentation-v3
DC970 Presents: Defense in Depth
Advanced persistent threat (apt) & data centric audit and protection (dacp)
The State of Threat Detection 2019
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Talos threat-intelligence
The Four Types of Threat Detection and Use Cases in Industrial Security
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Ransomware Detection: Don’t Pay Up. Backup.
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Trisis in Perspective: Implications for ICS Defenders
Ad

Similar to Phases of Incident Response (20)

PPTX
Incident Response Security
PPT
Incident handling.final
PPTX
Lecture 06 - Incident Management and SOC.pptx
PPTX
Incident response Process in information security .pptx
PPTX
Incident response
PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PPT
Latihan6 comp-forensic-bab5
PPT
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PPTX
L11 Transition And Key Roles and SAT ROB IRP.pptx
PPTX
The Six Stages of Incident Response - Auscert 2016
PPTX
The Six Stages of Incident Response
DOCX
Winchester Aquarium and Pet Center Incident Response Plan
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
DOCX
Incident ResponseAs a security professional, you will.docx
PDF
5 Steps to Improve Your Incident Response Plan
PPT
IRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRT.ppt
PPT
introcsce813-lect6csce813-lect6csce813-lect6.ppt
PPTX
IT Security and Management - Semi Finals by Mark John Lado
PPTX
You Will Be Breached
Incident Response Security
Incident handling.final
Lecture 06 - Incident Management and SOC.pptx
Incident response Process in information security .pptx
Incident response
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Latihan6 comp-forensic-bab5
11-Incident Response, Risk Management Sample Question and Answer-24-06-2023.ppt
INCIDENT RESPONSE NIST IMPLEMENTATION
L11 Transition And Key Roles and SAT ROB IRP.pptx
The Six Stages of Incident Response - Auscert 2016
The Six Stages of Incident Response
Winchester Aquarium and Pet Center Incident Response Plan
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
Incident ResponseAs a security professional, you will.docx
5 Steps to Improve Your Incident Response Plan
IRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRTIRT.ppt
introcsce813-lect6csce813-lect6csce813-lect6.ppt
IT Security and Management - Semi Finals by Mark John Lado
You Will Be Breached
Ad

More from EC-Council (20)

PPTX
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
PDF
Cloud Security Architecture - a different approach
PDF
Weaponizing OSINT – Hacker Halted 2019 – Michael James
PDF
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
PDF
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
PPTX
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
PDF
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
PDF
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
PDF
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
PDF
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
PDF
War Game: Ransomware – Global CISO Forum 2019
PPTX
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
PDF
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
PPTX
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
PPTX
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
PPTX
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
PPTX
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
PPTX
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
PPTX
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
PPTX
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...
CyberOm - Hacking the Wellness Code in a Chaotic Cyber World
Cloud Security Architecture - a different approach
Weaponizing OSINT – Hacker Halted 2019 – Michael James
Hacking Your Career – Hacker Halted 2019 – Keith Turpin
Hacking Diversity – Hacker Halted . 2019 – Marcelle Lee
Cloud Proxy Technology – Hacker Halted 2019 – Jeff Silver
DNS – Strategies for Reducing Data Leakage & Protecting Online Privacy – Hack...
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Breaking Smart [Bank] Statements – Hacker Halted 2019 – Manuel Nader
Are your cloud servers under attack?– Hacker Halted 2019 – Brian Hileman
War Game: Ransomware – Global CISO Forum 2019
How to become a Security Behavior Alchemist – Global CISO Forum 2019 – Perry ...
Introduction to FAIR Risk Methodology – Global CISO Forum 2019 – Donna Gall...
Alexa is a snitch! Hacker Halted 2019 - Wes Widner
Hacker Halted 2018: Don't Panic! Big Data Analytics vs. Law Enforcement
Hacker Halted 2018: HACKING TRILLIAN: A 42-STEP SOLUTION TO EXPLOIT POST-VOGA...
Hacker Halted 2018: Breaking the Bad News: How to Prevent Your IR Messages fr...
Hacker Halted 2018: From CTF to CVE – How Application of Concepts and Persist...
Hacker Halted 2018: SE vs Predator: Using Social Engineering in ways I never ...
Global CCISO Forum 2018 | Sebastian Hess "Cyber Insurance and Cyber Risk Quan...

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Empathic Computing: Creating Shared Understanding
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Cloud computing and distributed systems.
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Approach and Philosophy of On baking technology
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Empathic Computing: Creating Shared Understanding
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
Network Security Unit 5.pdf for BCA BBA.
Diabetes mellitus diagnosis method based random forest with bat algorithm
Spectral efficient network and resource selection model in 5G networks
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Cloud computing and distributed systems.
The AUB Centre for AI in Media Proposal.docx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Approach and Philosophy of On baking technology
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Phases of Incident Response

  • 2. AboutMe ● Zachery S. Mitcham ● 38 years of Information Security experience beginning as a U.S. Army Officer ● MSA-Administration, Certified CISO; Certified Computer Security Incident Handler; Graduate Certificate-Harvard University ● I am one of thirteen children ● Feel free to view my linkedin profile at: https://www.linkedin.com/in/zmitcham/
  • 3. Prerequisites There are no formal prerequisites for this class however you will benefit greatly by previewing the NIST 800 special publication 61 accessible at the following link: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800- 61r2.pdf
  • 4. Supplementary Materials We will use NIST 800 sp 61 as the basis for our discussion. Again, you may download it at the following link: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-6 1r2.pdf
  • 5. Target Audience ● This class is primarily intended for those that are in need of an informational overview on how to respond to information security incidents or have a responsibility for doing so. ● It will also assist with your preparation for a Computer Security Incident Handling certification
  • 6. Learning Objectives ❖ Upon completion of this class you will be able to: ➢ Identify the phases of incident response ➢ Create a Computer Security Incident Response Plan ➢ Identify composition of key personnel necessary to serve as incident responders. ❖ This class will cover the phases of incident handling and how each phase relates to responding to information security incidents.
  • 7. Definitions ❖ The mission of information security professionals is to safeguard the confidentiality, integrity and availability of data that is processed, stored and transmitted over a technological network whether it is at rest or in flight. ❖ Security Incident - any situation, condition, or circumstance whereby security control measures placed within information systems are circumvented. ❖ Computer Security Incident Response Team (CSIRT)- An organization or team that provides services and support to a defined constituency for preventing, handling, and responding to computer security incidents.
  • 8. Phases of IncidentResponse ❖ Preparation ❖ Detection andAnalysis ❖ Containment, Eradication and Recovery ❖ Post IncidentActivity
  • 9. Incident Handling Activities Triage – the actions taken to categorize, prioritize, and assign events and incidents. Detecting and Reporting – the ability to receive and review event information, incident reports, and alerts. Analysis – the attempt to determine what has happened, what impact, threat, or damage resulted, and what recovery or mitigation steps should be followed. This can include characterizing new threats that may impact the infrastructure. Incident response – the actions taken to resolve or mitigate an incident, coordinate and disseminate information, and implement follow-up strategies to prevent the incident from happening again.
  • 10. Preparation Phase Adequate systems, resources and tools emplaced to respond to the incident Incident Response Plan development Incident Response Team Development Contact information for team members, War room, Evidence gathering
  • 11. Detection and Analysis Phase Identification and assess magnitude of the threat (IDS/IPS, Security Information and Event Management (SIEM),A/V tools-System Center Configuration Manager(SCCM), system logs)
  • 12. Containment, Eradication and Recovery Prevention of threat propagation, remediation and operational or system restoration.
  • 13. Post Incident Activity Post Mortem debriefing, Lessons Learned, Documentation and Reporting.
  • 14. Quiz What is the first phase of incident handling? A) Panic phase B) Priority Information Requirements phase C) Paranoia phase D) Preparation phase Answer D - The Preparation Phase-is the most important phase. Without it your response will be inadequate. Always remember to “Sweat more in training and bleed less in war!”
  • 15. Quiz What is Triage? A) Remediation of issues causing the incident B) Artifacts analysis C) Prioritizing events D) Reporting the incident to law enforcement Answer C - Prioritizing. Triage are the actions taken to categorize, prioritize, and assign events and incidents.
  • 16. Summary ● During this class, we discussed: ❖ The different phases of incident response and how each phase relates to responding to information security incidents ❖ Creation of a Computer Security Incident Response Plan ❖ Identification of key personnel necessary to serve as incident responders. ● Looking forward, our next class will cover the individual phases of incident response in depth