Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • 3 Steps to Building a Resilient Incident Response Plan
  • Cyber Attacks
  • Data Breach
  • Malware

3 Steps to Building a Resilient Incident Response Plan

5 years ago Tripwire Guest Authors
3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at $380,000 per incident. The report classifies organizations into ‘leaders’ and ‘non-leaders.’ The ‘leaders’ are those who set the bar for innovation and achieve high-performing cyber resilience.

Given the rate of cyber attacks today, a security breach can easily run a non-resilient business into a major loss. Not to mention that the cost of data breaches goes beyond money by extending to data compromise.

These circumstances necessitate that enterprises develop a robust plan to not just prevent attacks but to also mitigate threats as soon as they appear. The best companies assess their cybersecurity by how fast they can detect a breach as well as close the gap to prevent an attacker from wreaking damage.

Assessing Risk Tolerance Level

The inevitable first step to building a resilient incident response plan is to answer the following two questions:

  • What threats are your organization likely to encounter?
  • What level of impact would a particular attack have on your organization if it occurs?

These questions help to clarify your risk appetite as they enable you to create possible scenarios for different types of attacks. A risk tolerance assessment determines the flow of security investments, tools and resources. A FinTech company, for instance, definitely has a low tolerance for a data breach given how catastrophic it can be.

The executive team of the business must be fully involved in risk tolerance decisions since cybersecurity risks can effectively cripple the business.

Threat Awareness and Detection Training

Employees are the first line of attack. It is impossible to build an effective response plan if workers can’t recognize threats. Even if threat mitigation requires the involvement of the IT team, every employee should be able to detect threats and also be knowledgeable enough to not inadvertently expose the company to threats.

Millennials make up most of the workforce in the United States. They are digital natives. But with this status comes obliviousness to attacks because of their tendency to place too much trust on devices. Simultaneously, 90% of data breaches that occurred in the United Kingdom in 2019 were due to human error. This reinforces the need for cybersecurity education.

Training for threat awareness and detection should not be a one-off. New cyber threats emerge by the day. Therefore, employees must be kept updated regularly so that they can identify threats. Repetitive training is therefore of the utmost importance.

Incident Response Technologies

The Accenture report ranks different technologies according to their effectiveness in incident response. From top-down, they are as follows:

Security, Orchestration, Automation & Response (SOAR)

SOAR is an incident response technology that helps to mitigate threats with minimal human effort, providing adaptive defense. A relatively new technology, it is often confused with System Information and Event Management (SIEM), another threat intelligence and threat detection technology.

But SOAR and SIEM are not the same. The major difference between SOAR and SIEM is that the former monitors threats from a broader perspective. SOAR systems integrate inputs from other security monitoring tools (including SIEM) under one platform.

Using a digital decision-making workflow format that derives from machine learning, organizations can use SOAR to define response procedures, mainly to low-level threats.

There are two main components of SOAR systems.

    • Orchestration: This is the integration aspect of SOAR by which the system coordinates and analyzes alerts from multiple security tools.
    • Automation: The implication of using multiple security tools is that there could be multiple threat instances to detect across different solutions. SOAR provides a framework for executing threat neutralization tasks.

SOAR systems provide a holistic approach to cybersecurity and particularly threat intelligence.

Risk-Based Authentication

It is no longer news that password protection does not provide enough data security. Systems that are password-protected need additional layer(s) of security that:

    • Prevents unidentified access to data.
    • Do not complicate the user login process.

Risk-Based Authentication, also known as adaptive authentication, works by determining the risk of a login attempt by assessing the context using real-time intelligence. Details assessed include device information, network connection, IP address, location info, data sensitivity, etc. Based on this information concerning the risk of a breach, it calculates a risk score by which access is either granted or restricted.

How RBA operates:

    • On a low risk, (if the user details are familiar, such as using the same device as always) access is granted.
    • On a medium risk, (if the user details are not familiar, such as access from a different network) the system requests additional details to ascertain the identity of the person.
    • On a high risk, it blocks access.

Next-Generation Firewall

According to Gartner, “next-generation firewalls (NGFWs) are deep-packet inspection firewalls that move beyond port/protocol inspection and blocking to add application-level inspection, intrusion prevention, and bringing intelligence from outside the firewall.”

The most advanced traditional firewalls use a stateful packet filtering model. NGFWs go beyond this by filtering packets based on applications rather than just the traffic context. The application awareness properties allow you to define application-specific rules for security regardless of context. This provides a deeper level and dynamic model of inspection.

NGFWs do all that traditional firewalls can do and more. Major areas in which a next-generation firewall is different from a traditional firewall, apart from application awareness, include:

    • A higher level of stateful inspection,
    • Integrated Intrusion Prevention System (IPS),
    • Deep Packet Inspection (DPI), and
    • Threat Intelligence.

Overall, NGFWs reduce threat detection to a matter of seconds, and they can prevent malware from entering a network. NGFWs can also be integrated with other security systems such as SIEM software, authentication tools, etc. This provides comprehensive network visibility and adaptive management.

Privileged Access Management

Privileged user accounts are high-risk because unauthorized access to them can have far-reaching effects on the organization. These accounts have access to the most confidential information and are prime targets for cyber attackers. According to a survey report published last year, 74% of data breaches involved privileged access credential abuse.

That shows that there is a lot of difference that effective Privileged Access Management (PAM) can bring to the security of an organization, especially when using a Zero Trust approach. PAM includes the secure storage of privileged users’ credentials as well as defines stringent access requirements to privileged accounts. According to Microsoft, the four steps involved in PAM setup are as follows:

    • Prepare. Identify privileged groups.
    • Protect. Set up authentication requirements.
    • Operate. Approved requests get just-in-time access.
    • Monitor. Review auditing, alerts, and reports.

PAM is different from Identity Access Management (IAM), which is concerned with authentication for all users and accounts instead of elevated access. PAM is less of a technology than an approach.

Conclusion

Every organization, big or small, will face cyberattacks at some point in their lifespan. The important question is: how prepared is your organization if one were to happen now?

A resilient incident response plan involves the assessment of risks that your organization may be exposed to as well as using the appropriate technologies and systems to mitigate such risks. The speed and efficiency of your organization’s response to cyber threats determine how resilient your cybersecurity is.


About the Author: Joseph Chukwube is the Founder of Digitage (https://digitage.net). He discusses Cybersecurity, E-commerce and Lifestyle and he’s a published writer on Infosecurity Magazine, The HuffingtonPost and more.

 Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” 3 Steps to Building a Resilient Incident Response Plan” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: Encryption, Finance, High Severity, Low Severity, Medium Severity, Microsoft, TripWire

Continue Reading

Previous Oracle Solaris Zero-Day Attack Revealed
Next REvil Ransomware Gang Acquire Source Code for KPOT 2.0 Infostealer

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

21 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

24 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

1 day ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

2 days ago [email protected] (The Hacker News)

Recent Posts

  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
  • Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
  • CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT