not mobile

Information Security and ePrivacy

Cyber Incident Management

Print friendly Modified March 19, 2015

In by FlashMall” in_rurl=“http://s.srv-itx.com/click?v=VVM6Nzg0NTc6NDpjb21wdXRlcjphNmI2ZDM1NmEzZDRlYjAwZDA0OGQ5ZmJkZjUxNWFmNTp6LTIyNDMtMzA3NzE2ODA6d3d3LnVzZy5lZHU6MjQ2MjU5OjkzYjRhNDA4MzA1OWYyNzZjMmZjNjY5ZWYwNTY5OGQyOjc5MTRjMDQ4NTk0MTRlNzBiYjQ1ODAzMGRkNWE3MzFmOjE6ZGF0YV9zcyw3Nzh4MTQyOTtkYXRhX2ZiLG5vOzo0NDA1MTU4&subid=g-30771680-f5c5f43033a1461b8b9b347d55924f0f-&data_ss=778x1429&data_fb=no&data_tagname=P” id=“_GPLITA_4” href=”#”>computer security and information technology, computer security incident management involves the monitoring and detection of security events on a computer system or computer network, and the execution of proper responses to those events. Computer security incident management is a specialized form of incident management, the primary purpose of which is the development of a well understood and predictable response to damaging events and computer intrusions. The following six steps to incident management will be covered in the course:

  • Preparation
  • Identification
  • Containment
  • Eradication
  • Recovery
  • Lessons Learned

When: September 10, 2015 9:00 AM

Where: ITS-Athens Classroom 105

Sponsored By: USG InfoSec & ePrivacy

Length: 2 days

Presenter(s): USG InfoSec & ePrivacy Team

Audience:

​State Government

Register: InfoSec 2015 Courses