<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3026858&amp;fmt=gif">

1 min read

The Eight Step to Forensic Readiness: Incident Response Training & Awareness

Featured Image

The end goal of this step is to ensure that internal training & awareness programs take place within your organization since your employees may be involved in the process of handling security incidents. 

Training will also ensure that your employees are ready to take on roles related to the handling and preservation of evidence. Learn how to create proactive training sessions for your staff so that all those involved understand their role in the digital evidence process and the legal sensitivities of evidence.

According to IJDE, the following groups will require more specialized awareness training:

  • The investigating team
  • Corporate HR department
  • Corporate PR department (to manage any public information about the incident)
  • Owners of business processes or data
  • Line management
  • Corporate security
  • System administrators
  • IT management
  • Legal advisers
  • Senior Management (potentially up to board level) 

If an incident occurs, a multi-disciplinary team will be gathered from the above-listed groups. Therefore, it is more than beneficial to keep employees educated and aware on incident response management and digital evidence handling.

Due to the sensitivity of the event and tasks themselves, it is good to have an incident response plan with listed tasks and responsibilities for each employee. This will require extensive support and training to understand the decision points, to make the right decisions, and to avoid tainting evidence or prejudicing a case. Role-play training is ideally suited to this scenario. 

Therefore, as a wide range of employees may be a part of the incident response handling it is essential to ensure appropriate training to prepare staff for the various roles they may play before, during, and after an incident. It is also necessary to ensure that staff is competent to perform any roles related to the handling and preservation of evidence. 

In the next step, we will learn more about incident response documents and reporting.

Click here to learn about the previous steps to forensic readiness.

How to perform compromise assessment with 1 click?

Compromise assessment is an analysis of a network of endpoints or a single endpoint to uncover unknown security breaches, malware, and any sign of...

Read More

Microsoft Exchange Server Vulnerability Scanner (CVE-2021-42321)

UPDATE 15.11.2021.

Microsoft patches actively exploited Exchange, Excel zero-days (CVE-2021-42321). Please refer to their site for more details. 


Read More

The Tenth Step to Forensic Readiness: Legal review

When we plan our incident response strategies and forensic readiness steps, we strongly pay attention to digital evidence acquisition, storage,...

Read More