Intelligent CIO Africa Issue 32 | Page 14

LATEST INTELLIGENCE HOW TO PREPARE FOR A CYBER ATTACK: PRESENTED BY SIX CORE CAPABILITIES MODEL “I n our current state of cyber security, security breaches are inevitable. This is an important fact, so I am intentionally repeating it. In our current state of cyber security, security breaches are inevitable.” With those words, FireEye Chief Executive Officer Kevin Mandia opened his testimony to the U.S. House Permanent Select Committee on Intelligence in a previous hearing. Download whitepaper here He was speaking in the wake of several high-profile data breaches that had piqued concern among law-makers. As recent headlines demonstrate, his prediction is more relevant than ever. The question is no longer “will you be breached,” but “how will you respond when you are breached,” despite your best efforts at prevention. The organization with a well-designed incident response plan has a much greater advantage than the organization without one. 14 INTELLIGENTCIO Having detection technology in place is only the start of a thorough defense. Today’s threat landscape also requires a detailed incident response strategy to detect, respond to, and contain a breach, along with staff expertise to implement that strategy. Once it’s determined that an attacker has infiltrated your network, you must move quickly to minimize damage to your organization’s infrastructure, brand and customer base This paper draws on the worldwide incident response (IR) experience of Mandiant, a FireEye company, to explore the three phases of preparing for a cyber attack: • Developing an effective IR plan • Adopting the proper capabilities to execute that IR plan • Practicing the IR plan n www.intelligentcio.com