LATEST INTELLIGENCE
HOW TO PREPARE FOR
A CYBER ATTACK:
PRESENTED BY
SIX CORE CAPABILITIES MODEL
“I
n our current state of cyber security, security
breaches are inevitable. This is an important
fact, so I am intentionally repeating it. In
our current state of cyber security, security breaches
are inevitable.”
With those words, FireEye Chief Executive Officer
Kevin Mandia opened his testimony to the U.S. House
Permanent Select Committee on Intelligence in a
previous hearing.
Download whitepaper here
He was speaking in the wake of several high-profile
data breaches that had piqued concern among
law-makers. As recent headlines demonstrate, his
prediction is more relevant than ever.
The question is no longer “will you be breached,”
but “how will you respond when you are breached,”
despite your best efforts at prevention. The
organization with a well-designed incident response
plan has a much greater advantage than the
organization without one.
14
INTELLIGENTCIO
Having detection technology in place is only the start
of a thorough defense.
Today’s threat landscape also requires a detailed
incident response strategy to detect, respond to,
and contain a breach, along with staff expertise to
implement that strategy.
Once it’s determined that an attacker has infiltrated
your network, you must move quickly to minimize
damage to your organization’s infrastructure, brand
and customer base
This paper draws on the worldwide incident
response (IR) experience of Mandiant, a FireEye
company, to explore the three phases of preparing
for a cyber attack:
• Developing an effective IR plan
• Adopting the proper capabilities to execute that
IR plan
• Practicing the IR plan n
www.intelligentcio.com