Incident Management Phrase Written on BlackboardINCIDENT RESPONSE

HOW: An Effective Incident Response Plan Can Help You Predict Your Security Future. Chief information security officers (CISOs) understand that their enterprises will be subject to a breach, or at least an attempted attack, at some point. While they can’t predict the future, they can learn a lot about would-be attackers’ motivations and methods just by developing a thorough incident response strategy. This plan is crucial because it informs your actions, helps you create a positive outcome, and minimizes data loss and operational disruption in the event of a breach. Here are five key questions to consider when developing your incident response plan. Read more

BREACH PREPAREDNESS: Incident Response Insights from US Army Medicine CISO. The recent Equifax mega-breach demonstrates how essential it is to have a robust, well-tested incident response plan in place that includes a strong public relations component, says Heath Renfrow, CISO at U.S. Army Medicine. Read the rest

SECURITY: Federal IT Security Leaders Push for More Training to Boost Cybersecurity Response. The Trump administration’s executive order on cybersecurity gives agencies enough direction to guide investments in education and training, officials say. Find out more

ENDPOINT: How Businesses Should Respond to the Ransomware Surge. Modern endpoint security tools and incident response plans will be key in the fight against ransomware. Find out more


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems September 2017

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Incident Response – Daily Tech Update – October 16, 2017

Leave a Reply