The advent of successful Cyber Crimes, and attacks against applications, systems, and infrastructures has driven the corporate mood to consider the scenario of what to do ‘when’, rather than ‘if’ they are subject to a cyber-attack, or compromise – a mood which in turn has driven their increased focus upon CSIRT, First Responder Capabilities, and the application of Digital Forensics.

As anyone who has been involved with a full on in-flight cyber-attack, or compromise will tell you, the time to consider the opportunities for strategic response is ‘not’ when dealing with the event, but should be put in place ‘before’ it happens. This following article is just a scrape at the surface to assist with an introduction to some areas which may help to build the internal CSIRT mission.

Click image to download NOW

Digital Forensics

Professor John Walker  FMFSoc FBCS FRSA CITP CISM CRISC ITPCjohn walker

Visiting Professor at the School of Science and Technology at Nottingham Trent University (NTU), Visiting Professor/Lecturer at the University of Slavonia[to 2015], CTO and Company, Director of CSIRT, Cyber Forensics, and Research at INTEGRAL SECURITY XASSURNCE Ltd, Practicing Expert Witness, ENISA CEI Listed Expert, Editorial Member of the Cyber Security Research Institute (CRSI), Fellow of the British Computer Society (BCS), Fellow of the Royal Society of the Arts, an Associate Researcher working on a Research Project with the University of Ontario, and a Member, and Advisor to the Forensic Science Society.

 

Subscribe
Notify of
guest
0 Expert Comments
Inline Feedbacks
View all comments
Information Security Buzz
0
Would love your thoughts, please comment.x
()
x