Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

At IRISSCON 2017, 48 contestants across 12 teams battled it out in a free-for-all CTF competition to test their hacking, defending and forensics skills.

The post Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition appeared first on Security Intelligence.

Continue reading Inside the IBM X-Force Command Advanced Persistent Threat CTF Competition

Practice: The Best Defense for Responding to Cyber Incidents

When it comes to defending an organization against cyberattacks and their aftershocks, the best way to shore up incident response is to practice.

The post Practice: The Best Defense for Responding to Cyber Incidents appeared first on Security Intelligence.

Continue reading Practice: The Best Defense for Responding to Cyber Incidents

Testing Top Leadership’s Muscle Memory With Data Breach Simulations

Just like security analysts, top executives need data breach training to develop the skills required to carry out an effective incident response strategy.

The post Testing Top Leadership’s Muscle Memory With Data Breach Simulations appeared first on Security Intelligence.

Continue reading Testing Top Leadership’s Muscle Memory With Data Breach Simulations

Game Over: Improving Your Cyber Analyst Workflow Through Gamification

Gamification is an engaging way to motivate security operations center analysts to develop their incident response skills and situational awareness.

The post Game Over: Improving Your Cyber Analyst Workflow Through Gamification appeared first on Security Intelligence.

Continue reading Game Over: Improving Your Cyber Analyst Workflow Through Gamification

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

The post When a Cyber Crisis Hits, Know Your OODA Loops appeared first on Security Intelligence.

Continue reading When a Cyber Crisis Hits, Know Your OODA Loops

‘In Security’ Web Comic, Episode 006: The Great Dawnack

In this installment of “In Security,” the Great Dawnack’s crystal ball depicted a troubling future for companies battling increasingly advanced threats.

The post ‘In Security’ Web Comic, Episode 006: The Great Dawnack appeared first on Security Intelligence.

Continue reading ‘In Security’ Web Comic, Episode 006: The Great Dawnack

Crisis Leadership, Part 2: What Are We Learning?

In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.

The post Crisis Leadership, Part 2: What Are We Learning? appeared first on Security Intelligence.

Continue reading Crisis Leadership, Part 2: What Are We Learning?