Cyber Security Incident Response Guide

May 29, 2013

This Guide provides details about how to handle cyber security incidents in an appropriate manner. It provides you with practical advice on how to prepare for, respond to and follow up an incident in a fast and effective manner – presented in an easy to use format. It is designed to enable you to determine what a cyber security incident means to your organisation, build a suitable cyber security incident response capability and learn about where and how you can get help

Spotlight

Sopra Steria

One of the most extensive portfolios of end to end service offerings in the market. Sopra Steria, a European leader in digital transformation, provides one of the most comprehensive portfolios of end-to-end service offerings on the market: consulting, systems integration, software development, infrastructure management and business process services.

OTHER WHITEPAPERS
news image

HMC 1030 Connectivity Security White Paper

whitePaper | March 14, 2023

This document describes data that is exchanged between the Hardware Management Console (HMC) and the IBM Service Delivery Center (SDC). In addition, it also covers the methods and protocols for this exchange. This includes the configuration of “Call Home” (Electronic Service Agent) on the HMC for automatic hardware error reporting. All the functionality that is described herein refers to Power Systems HMC and the HMC that is used for the IBM Storage System DS8000.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More
news image

AI Security White Paper

whitePaper | January 23, 2020

With the accumulation of big data, dramatic improvements in computing power, and continuous innovation in Machine Learning (ML) methods, Artificial Intelligence (AI) technologies such as image recognition, voice recognition, and natural language processing have become ubiquitous. Meanwhile, AI poses a significant impact on computer security: on the one hand, AI can be used to build defensive systems such as malware and network attack detection; on the other hand, AI might be exploited to launch more effective attacks.

Read More
news image

X-Force Threat Intelligence Index 2022

whitePaper | September 12, 2022

The world continues to grapple with a lasting pandemic, shifts to work-from-home and back-to-office, and geopolitical changes spawning a constant drone of mistrust. All of this equates to chaos, and it is in chaos that cybercriminals thrive.

Read More
news image

Consumer IoT Device Cybersecurity Standards, Policies, and Certification Schemes

whitePaper | February 16, 2023

There are three key elements in the world of Internet of Things cyber security. Standards are created in order to harmonize a common set of requirements. Regulations are created in order to incentivize manufacturers to adopt cybersecurity hygiene practices so as to protect societies and increase their cyber-resilience. Labels are created in order to provide visibility to consumers.

Read More
news image

Cisco Secure and the NIST Cybersecurity Framework

whitePaper | December 6, 2022

Cybersecurity can seem overwhelming, and there’s plenty of long to-do lists. The Center for Internet Security (CIS) has the Critical Security Controls, the International Organization for Standardization (ISO) has its 27000-series publications, and ISACA manages its COBIT 5 framework. Layer those atop compliance mandates like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Gramm-Leach Bliley Act (GLBA) — and it’s often hard to know where to start.

Read More

Spotlight

Sopra Steria

One of the most extensive portfolios of end to end service offerings in the market. Sopra Steria, a European leader in digital transformation, provides one of the most comprehensive portfolios of end-to-end service offerings on the market: consulting, systems integration, software development, infrastructure management and business process services.

Events