Device Theft/Loss Incident Response Playbook

By : 6clicks
This Incident Response Methodology is a cheat sheet dedicated to incident handlers investigating a precise security issue.
In stock

Details

This download includes the 6clicks Incident Response playbook for Device Theft/Loss

The purpose of a Cyber Security Playbook, or Security Playbook, is to provide all members of an organisation with a clear understanding of their roles and responsibilities regarding cybersecurity – before, during and after a security incident.

Laptops, phones, and tablets boost productivity, but they also increasingly store sensitive data that puts your organization at risk of a breach if they fall into the hands of cyber thieves. Often, an organization’s endpoints are used as the gateway for a cyberattack. A laptop or phone doesn't seem like it could be the stepping off point for a cyberattack but think of the passwords and network information stored on every single device that connects to your network.

Remember: If you face an incident, follow IRM, take notes, and do not panic. Contact your CERT immediately if needed.

6 steps are defined to handle security Incidents:

  • Preparation: get ready to handle the incident
  • Identification: detect the incident
  • Containment: limit the impact of the incident
  • Remediation: remove the threat
  • Recovery: recover to a normal stage
  • Aftermath: draw up and improve the process

Getting Started

Click "Book a demo" and our team will provide you with an overview of our content library within the 6clicks GRC platform.

More Information

More Information
Jurisdiction All
Type Playbook