Incident Response Services Include:
- Program Planning and Design
- Program Gap Analysis
- Table Top Incident Response Exercise
Program Planning and Design
Many organizations have a strategic security program in place but struggle with planning, implementing and maintaining a timely and effective incident response program. InteliSecure’s team of consultants have helped numerous customers around the globe build highly efficient and effective incident response programs.
We combine best practices from ISO 27001 with guidance from ISO 27002 to frame the process. They assess your current operations to determine if there are processes or technologies that can be used to support the incident response program. The consultants also share best practices from our data loss prevention consulting as well as SIEM consulting services including recommended internal resources, third-party providers and technology that will optimize the program. The result is a tailored incident response program design capable of supporting centralized or decentralized global operations with timely notifications. This helps you effectively address risk and provide metrics that drive behavior change throughout the organization.
Program Gap Analysis
Through an extensive interview process, InteliSecure consultants work with clients to identify strengths and weaknesses within existing incident response programs, providing risk assessments, prioritization, and recommendations for changes.
Table Top Incident Response Exercise
Being prepared to respond to an incident involves unified communication, planning, capability development, training, evaluation and improvement. Interactive tabletop exercises help establish baselines and uncover recommendations to enable organizations to validate existing plans, policies and procedures as they pertain to a cyber attack.
InteliSecure tabletop exercises help organizations understand and gauge preparedness for cyber attacks and optimize IR plans in a relaxed, low-stress environment. They elicit constructive discussions as participants examine and resolve problems based on existing operational plans, identifying where those plans need to be refined. Based on pre-engagement meetings, we will develop scripted scenarios that meet your objectives. Scenarios could include but are not limited to denial of service (DOS), data breaches, unplanned outages, ransomware and more.