Device Theft/Loss Incident Response Playbook

By : 6clicks
This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a precise security issue.
In stock

Details

This download includes the 6clicks Incident Response playbook for Device Theft/Loss

The purpose of a Cyber Security Playbook, or Security Playbook, is to provide all members of an organisation with a clear understanding of their roles and responsibilities regarding cybersecurity – before, during and after a security incident.

Laptops, phones, and tablets boost productivity, but they also increasingly store sensitive data that puts your organization at risk of a breach if they fall into the hands of cyber thieves. Often, an organization’s endpoints are used as the gateway for a cyberattack. A laptop or phone doesn't seem like it could be the stepping off point for a cyberattack but think of the passwords and network information stored on every single device that connects to your network.

Remember: If you face an incident, follow IRM, take notes, and do not panic. Contact your CERT immediately if needed.

6 steps are defined to handle security Incidents:

  • Preparation: get ready to handle the incident
  • Identification: detect the incident
  • Containment: limit the impact of the incident
  • Remediation: remove the threat
  • Recovery: recover to a normal stage
  • Aftermath: draw up and improve the process

Getting Started

Click "Book a demo" and our team will provide you with an overview of our content library within the 6clicks GRC platform.

Resources

Security compliance expert guide

More Information

More Information
Jurisdiction All
Type Playbook