SH&NR Week 10 Posting - Importance of Incident Response and SH&NR Wrap UP
SH&NR Week 10
Importance of Incident Response
In today's cybersecurity landscape, cyber threats can come from almost anywhere. Like troubleshooting a hardware or software issue, it is important to have a thorough documented process for analysts and CSIRT team members to follow. A solid incident response procedure also includes ensuring that communication between employees, contractors, and customers is detailed and in place. When these two procedures are combine, they allow organizations to have an efficient incident response that avoids creating larger issues while informing customer and shareholders as needed. Mitigation, recovery, and communication are important, but preparation and post-incident activities allow organizations to learn from their mistakes and improve security. System hardening and vulnerability scans help organizations be prepared for possible attacks while detailed incident response allows them to handle the incident as efficiently and effectively as possible.
Wrap Up
I have thoroughly enjoyed this course. When I started this degree, I knew I wanted to be in the IT field. I just was not sure where in the field to go. I really like the networking side, however, I found that I really connect with cybersecurity topics. During the semester, I earned my first security based IT certification, Certified in Cybersecurity by ISC2. While the certification and this course has not helped me ion my current role, they both have established the motivation to continue to dive into cybersecurity. I am currently studying and plan to take the Security+ certification in a few months. This course also brought back weekly blogging for me. Blogging is an assignment that a enjoy as I can dig into some extra topics. I am currently looking at planning out several posts over the next few months, so I can keep blogging. As cybersecurity awareness month approaches, I hope that posting content here as well as social media sites, like LinkedIn, can educate others on cybersecurity and other IT topics while furthering my understanding.
Comments
Post a Comment