Тёмный

The 6 Steps of the Incident Response Life Cycle and What Is a Security Incident? 

Cyber Gray Matter
Подписаться 5 тыс.
Просмотров 9 тыс.
50% 1

Опубликовано:

 

16 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 21   
@ishwaryanarayan1010
@ishwaryanarayan1010 11 месяцев назад
Your voice and speed make us to listen and learn enthusiastic way 😎
@34meridian
@34meridian 9 месяцев назад
Fantastic video, very informative and breaks everything down well. Thanks!
@SoberCatboy
@SoberCatboy 2 года назад
Great music! And video 😸. You're a gentlewoman and a scholar. 🧐
@TimBohn1
@TimBohn1 Год назад
The company I work for has launched a new product that ingests events and alerts from other tools in an organizations security stack and allows that organization to automate real time security tips to the user who's risky action caused the event or alert via Slack or Teams. You have a way of describing things that fit in my brain:). I now understand the difference between an event and alert. Thank you so much for your videos. Now I need you to do a video on detection rules, to bring it all together for me :).
@cybergraymatter
@cybergraymatter Год назад
Can you specify detection rules? Like do you want more technical information on how to build one or a less technical way of how one is designed?
@syh7522
@syh7522 2 года назад
Excellent and to-the-point teaching content with excellent background music. Appreciated and already bookmarked 👍👍👍 Thanks ma'm..
@cybergraymatter
@cybergraymatter 2 года назад
You're very welcome! I greatly appreciate the feedback. I've been debating leaving out the background music, but I think it sounds nice.
@ditoman1
@ditoman1 2 года назад
Simlple and clean explanation... why did you choose SANS over NIST?
@cybergraymatter
@cybergraymatter 2 года назад
Thanks for your comment, David! The SANS has more steps than the NIST, and they basically say the same thing. I was wanted to elaborate on the cycle with more steps to create addutional explanation. They both have different value depending on the organization. NIST is for government use, and there could be a full containment, eradication, and recovery team. Another organization may have to outsource their recovery, so it fits better in its own step all together.
@The_LEGO_Journal
@The_LEGO_Journal 8 месяцев назад
this is very cool!
@DrThrax009
@DrThrax009 Год назад
What is the difference between an incident and sexurity breach?
@cybergraymatter
@cybergraymatter Год назад
Hello! So an incident can happen for many reasons, and it doesn't have to mean a breach. A breach is a type of incident.
@DrThrax009
@DrThrax009 Год назад
@@cybergraymatter understood. Thank you!
@starboygadtuso9530
@starboygadtuso9530 2 года назад
SANS has 6 stages NIST has 4 Stages, they both are the same. Why not just make 1 the standard in the overall cyber security industry. Everyone should all go by NIST (government). It's not really necessary trying to understand one thing in two different ways you know. Why not just call stage 2 identification instead of calling it "detection and analysis". Are we more worried about the impact of the incident or differentiating terminologies when its all the same thing.
@cybergraymatter
@cybergraymatter 2 года назад
Thanks for the input! I agree that it's silly that they essentially say the same thing, yet they are both treated as different standards. In fact, there's even ISO and ISACA to add to the list. It would have been easier to choose one, but I just wanted viewers to know the difference, as this may come up on a certification exam or asked in an interview. I tried to make the focus on the content of the steps vs the fact that they are arranged differently. As for what standard we should use, it really comes down to what an organization chooses. You may have a specific team to contain the incident and another that's primary function is to recover from it, so SANS might fit better in the IR plan layout when identifying who is in charge of what.
@starboygadtuso9530
@starboygadtuso9530 2 года назад
@@cybergraymatter thank you very much for the knowledge. it takes a real one to share knowledge like you did.
@MubashirMohd-v6h
@MubashirMohd-v6h 5 месяцев назад
Name the step responsible for writing down every information that could be used and be classified as important. (2 words)
@williechain6747
@williechain6747 2 года назад
Noice
@The_LEGO_Journal
@The_LEGO_Journal 8 месяцев назад
cool bruh
@munishjain6642
@munishjain6642 2 года назад
Speak slow please
@cybergraymatter
@cybergraymatter 2 года назад
Thanks for your comment, Munish. I will try and slow down for the next video. In the meantime, you can slow the video down to .75x speed in the video settings. Hope this helps!
Далее
CertMike Explains Incident Response Process
11:54
Просмотров 11 тыс.
What is a Zero Day Threat?
13:45
Просмотров 15 тыс.
Silent Hill 2 - Мульт Обзор
07:26
Просмотров 389 тыс.
NIST Incident Response Framework - Lisa
20:59
Просмотров 1,2 тыс.
Building a Cybersecurity Framework
8:27
Просмотров 37 тыс.
Real Hacking: Learn The Cyber Kill Chain
14:55
Просмотров 99 тыс.
MITRE ATT&CK Framework for Beginners
7:53
Просмотров 57 тыс.
What does an Incident Response Consultant Do?
8:28
Просмотров 5 тыс.