Response procedures for specific attack types like ransomware, BEC, and insider threats
Essential steps for responding to a reported phishing email, from initial triage to remediation.
Basic procedures for initial malware analysis and containment when malware is detected on a system.
Comprehensive response procedures for ransomware attacks, from detection to recovery.
Response procedures for BEC attacks including wire fraud attempts and executive impersonation.
Procedures for investigating potential insider threats, balancing security with legal and HR considerations.
Investigation procedures for suspected or confirmed data exfiltration incidents.
Procedures for detecting and responding to cryptocurrency mining malware on systems.