incidents is the bedrock for your team to perform during the high-stakes pressure of a critical cyber security incident.
With your standard incident management procedures second nature, it is only a matter of tweaking your processes at the margins to ensure heightened sensitive with your technical remediations and stakeholder communications.
2. The level of threat will dictate the tweaking required
In order to tweak at the margins of your usual incident management process, you first need to accurately assess the threat, your exposure and its potential impact, and react accordingly.
3. Experience breeds maturity
Over the past two years the evolution of our cyber security capability from WannaCry to Bluekeep has been significant. Of course, we cannot always learn from experience—the nature of cyber security is that attackers are always looking to exploit vulnerabilities that are new, novel or unexpected. Nonetheless, investing and enhancing our capabilities
within our operational security, combined with the experience of responding to past cyber threats has meant that our efficiency and effectiveness has increased significantly.
The final key point, as alluded to earlier, is the importance of developing close and collaborative partnerships with your vendors, customers and other important stakeholders—sharing knowledge and experience to collectively enhance your ICT environments.
About the Author
Peter Tonkin, Operations General Manager, Cenitex
Peter is a highly experienced and proven ICT leader with a background spanning work across large organisations and diverse industries. He is passionate about building internal and external business relationships with a focus on providing secure and resilient services to customers and tailoring solutions to meet their unique needs.