HOW TO PREPARE
FOR A CYBER ATTACK
Six core capabilities model
DOWNLOAD WHITEPAPERS AT:
n our current state of
cyber security, security
breaches are inevitable.
This is an important fact,
so I am intentionally repeating it. In our
current state of cyber security, security
breaches are inevitable.” when you are breached,” despite your
best efforts at prevention.
With those words, FireEye Chief
Executive Officer Kevin Mandia opened
his testimony to the U.S. House
Permanent Select Committee on
Intelligence in a previous hearing. He
was speaking in the wake of several
high-profile data breaches that had
piqued concern among law-makers.
As recent headlines demonstrate, his
prediction is more relevant than ever. Having detection technology in place
is only the start of a thorough defense.
Today’s threat landscape also requires
a detailed incident response strategy
to detect, respond to, and contain a
breach, along with staff expertise to
implement that strategy.
The question is no longer “will you be
breached,” but “how will you respond
The organization with a well-designed
incident response plan has a much
greater advantage than the organization
Once it’s determined that an attacker
has infiltrated your network, you must
move quickly to minimize damage to
your organization’s infrastructure, brand
and customer base. u