Cyber Incident Response in uncertain times

Documentation

We will provide you with a full suite of documents bespoke to your organisation, which will be practical and useful during an incident or crisis. If you already have documents, we are skilled at making sure that these documents are appropriate and effective for your organisation and industry.

Download Brochure
We will provide you with a bespoke

Policy

We know that the policy governing incident response is highly individualised to the organisation. However, most policies will include the same essential elements:

  • Statement of management commitment
  • Purpose and objectives
  • Scope
  • Definition of computer security incidents
  • Organisational structure and purpose of roles
  • Prioritisation or severity ratings of incidents
  • Performance measures
  • Reporting and contact forms
We will supply you with a bespoke

Plan

Organisations should have a formal, focused, and coordinated approach to responding to incidents, including an incident response plan which provides the roadmap for implementing the incident response capability. The incident response plan should include the following elements:

  • Mission
  • Strategies and goals
  • Senior management approval
  • An organisational approach to incident response
  • How the incident response team will communicate
  • Metrics for measuring the incident response capability and its effectiveness
  • Roadmap for maturing the incident response capability

Procedures

Procedures should be based on the incident response policy and plan. Standard operating procedures (SOPs) are a delineation of the specific technical processes, techniques, checklists, and forms used by the incident response team. SOPs should be reasonably comprehensive and detailed to ensure that the priorities of the organisation are reflected in response operations. SOPs should be tested to validate their accuracy and usefulness, then distributed to all team members.

We will provide you with

Bespoke Playbooks

We will provide you with playbooks to guide you through incidents and crisis, which have been proven to be prevalent within your organisation and industry. It is highly recommended that these playbooks are exercised along with the rest of your document suite to build your team's cyber muscle memory. It is our goal to make sure that no documentation becomes ‘shelfware’. The playbooks will include where necessary the following elements:

  • Statement of management commitment
  • Purpose and objectives
  • Scope
  • Definition of computer security incidents
  • Organisational structure and purpose of roles
  • Prioritisation or severity ratings of incidents
  • Performance measures
  • Reporting and contact forms

Get in touch!

Just simply leave your details here and we will get
back to you within 24 hours.

Restricted Access is a proud partner of


Download all Brochures

Enquire further for information and pricing on the full suite of Heimdal products which we sell