cyber incident scenario

4 Cyber Incident Scenarios You Should Exercise and Test

When it comes to evaluating technology in preparation for a potential disaster or cyber security incident, IT and security departments typically conduct multiple tests, playing out different scenarios to see how applications, systems, devices, and interfaces will respond in the event of an outage or attack. In business continuity, emergency management, or disaster recovery planning… Read More

incident response for industrial control systems

Developing Cyber Security Incident Response Plans for Industrial Control Systems

For many organizations, cyber security program and cyber security incident response plans (CSIRPs) also need to consider industrial control systems (ICS) when we look at the protection of critical services. Most often our discussions about Cyber Security Incident Response Plans (CSIRP) are focused on data security incidents. We know that across all industries, data contained in information… Read More

aws incident response

The Top 3 Open Source Tools for AWS Incident Response

Welcome to our third blog on incident response in the cloud. The first two posts primarily focused on the built-in capabilities from cloud service providers that can help your incident response efforts. We also discussed how to configure your Amazon Web Services (AWS) environment to take advantage of those features. Today, we are going to look at some tools that are… Read More

moving to the cloud

Q&A Part II: Common Misconceptions About Threat Hunting and the Impact of Moving to the Cloud

Yesterday, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz presented a webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” In advance of the webinar, Dev Panchwagh spoke with the presenters to gain more insights into this subject, including common misconceptions and the impact of moving to the cloud. Dev: I wanted to get your thoughts on the cloud…. Read More

threat hunting and compromise assessments

Q&A: Common Misconceptions About Threat Hunting and Compromise Assessments

In advance of our upcoming webinar on “Threat Hunting Versus Compromise Assessments: What’s the Difference?” Dev Panchwagh spoke with the presenters, Delta Risk’s Andrew Cook and Infocyte Founder and Chief Product Officer Chris Gerritz. In Part I of this two-part blog series, the team discusses some of the common misconceptions around threat hunting and compromise assessments. Join our webinar on April… Read More

incident response in the cloud

Incident Response in the Cloud: 4 Ways to Improve Your Investigation and Containment Capabilities

Dealing with the aftermath of an incident in a cloud environment can be a daunting scenario given the challenges that cloud infrastructure security presents. Depending on how many systems and applications you host in various cloud environments (including through your third-party connections), a single incident can have far-reaching consequences. Moreover, without physical access to your systems, lack… Read More