Andrew's Cybersecurity Blog
Cyber Crisis Response
Cyber Crisis Response introduces The SONAR Method™, a proven, proprietary framework for responding to and managing a range of cyber incidents, from singular events to the most complex cyber breaches and crises. Crisis response is a complex undertaking that requires the coordination of multiple, often conflicting, activities. No playbook replaces experience and critical thinking. Using The SONAR Method™ will help any practitioner:
-
Understand how to stabilize an environment during a cyber attack
-
Learn how to organize the team and resources needed to resolve the situation
-
Facilitate negotiations across a wide variety of stakeholders involved in the crisis
-
Discover how to effectively articulate and communicate the situation and resolution to a broad range of stakeholders
-
Develop the specific action plan required to remediate and recover from the incident
Written by experts who have lived in the trenches of crisis response, this book describes many of the common pitfalls and their battle-tested solutions. There is no better way to learn than to do it yourself, but understanding the lessons others have learned is essential to help you prepare.
Cyber Breach Response
Destructive ransomware attacks, disastrous data breaches, and a host of other cyber events are now headline news, negatively impacting numerous companies and millions of individuals around the world. Now more than ever, it is crucial that organizations prepare for cyberattacks and increase their cyber resilience as they expand their digital footprint and online presence. Cyber risk is no longer a hypothetical factor in the decision making process—senior managers, Chief Security Officers, and other key leaders need to understand the organizational aspects of cyber incident response to prepare for significant cyber events, deal with the repercussions of a security breach, and minimize the impact of a cybersecurity attack.
​
Cyber Breach Response That Actually Works is an authoritative source of information on building and managing a cyber breach response program. Rather than focusing on overly technical, step-by-step investigation and remediation techniques, this accessible resource discusses the bigger picture of where incident response fits within an overall cybersecurity program, and provides the tools necessary for designing and implementing a program from a governance perspective. Clear and concise chapters, assuming only a basic knowledge of cybersecurity and risk management concepts, provide a framework-agnostic approach for managing residual risk through cyber incident response, creating an effective and holistic strategy, and building capabilities that meets organizational needs.