Back to Course
Incident Response
0% Complete
0/71 Steps
-
Incident ResponseIncident Reporting
-
Incident Response Use CasesLab Setup
-
Role Playing - Shift Manager
-
Demonstrating: Investigating and Escalating
-
Report from Malware Analyst
-
Exercise 1.1: Exploring Suspicious Executable Detected using SIEM
-
Exercise 1.2: Investigating Multiple Failed Logins using SIEM
-
Exercise 3: Mitigating Risk
-
Exercise 4.1: Asking the Right Questions
-
Scenario 4.1: Asking the Right Questions
-
Scenario 4.2: Suspicious or Malicious?
-
Exercise 4.2: Reviewing the Shift Log
-
Exercise 4.3: Investigating an Unauthorized Login Attempt
-
Exercise 4.4: Investigating Firewall Traffic
-
Exercise 4.5: Reviewing the Security Operations Mailbox
-
Exercise 5.1: Reviewing New Intelligence
-
Exercise 5.2: Assessing Threat Severity
-
Exercise 6: Recommending Remediation
-
Exercise 7: Conducting a Post-Incident Review
-
Exercise 8: Communicating with Operations and Senior Management
-
Business ContinuityBusiness Continuity Plan Development8 Topics
-
BCP Invocation Process2 Topics
-
Emergency Procedures7 Topics
-
Crisis Management Team10 Topics
-
BCP Seating Plan
-
Overview
-
Disaster RecoveryScope of Critical Services
-
Network Services
-
Application Hosting Service
-
File Hosting Services
-
Call Centre and Voice Recording Services
-
Regulatory Links
-
Thin Client Environment
-
Voice System (Non-Service Desk)
-
Printing Services
-
Recovery Time Objective (RTO) & Recovery Point Objective
-
Single Point of Failure
-
Redundancy Requirements
-
Alternate Locations
-
Contact Protocol4 Topics
Participants3
In Progress
Lesson 24, Topic 5
In Progress
Head of Security
Lesson Progress
0% Complete
In emergency situation, the security of premises, assets and personnel should be of maximum priority, yet, the security responsibility may be shared between business owners and Security as follows:
Item | Responsibility Action | |
Security of Premises | § Security Head § § § | Customers / visitors handbags’ content should be checked upon access to bank premises. Customers / visitors National ID number should be registered in the Security Log detailing reason for visit. A “Visitor” card should be provided and returned to Security upon departure against receipt of the National ID. Ensure that access to the roof is secure to prevent break- Caution notice should be distributed to employees handling mail to be alert for detection of explosive devices. |
in
Functions include:
- Management of safety and security during invocation of the BCP.
- Evaluate physical security of any alternate facility to ensure satisfaction of security measures.