Security Response Policy
Good cyber and physical security can make or break companies. While it would be preferable that security breaches or incidents not take place at all, they don’t necessarily signal the death of an organization unless responded to in a poor fashion (or not at all).
The purpose of this Security Response Policy, written by Scott Matteson for TechRepublic Premium, is to outline the security incident response processes which must be followed.
Featured text from the policy:
Priority 1 (P1) incident
This is considered a crisis and may be triggered by one of the following events:
DDoS with no near-term mitigation.
Confirmed theft of significant data.
Active insider resulting in a major confidential data loss.
Malware resulting in data destruction or systemic failures.
Strengthen your security responses with our in-depth 13-page policy document. Previously priced at $99, this is now available for download at just $9. Alternatively, enjoy complimentary access with a Premium annual subscription. Click here to find out more.
TIME SAVED: Crafting this content required 20 hours of dedicated writing, editing and research.
Resource Details
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.
* Sign up for a TechRepublic Premium subscription for $299.00/year, and download this content as well as any other content in our library. Cancel anytime. Details here.