10 Common Flaws in Incident Response Plans by The SafeHouse (2024)

10 Common Flaws in Incident Response PlansAlex Waintraub, Cybersecurity and DFIR expert consultant joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to introduce him and his observations over his career about the 10 most common flaws in Incident Response Plans. This session is the introduction to the 10 common flaws in Incident Response Plans as Alex will join Jeff for the next 10 weeks as Co-Host of the SafeHouse Podcast. Alex and Jeff will have 10 special guests to explore each of the Incident Response Plan Flaws in more depth. Learn why an Incident Response plan is so important and what mistakes not to make in yours. Edited by David Lewis and Amy Scott and Produced by David LewisJun 13, 202417:45The NIST Cybersecurity Quick Start for SMB'sDaniel Eliot, Lead for Small Business Engagement, with the National Institute of Standards and Technology (NIST) Applied Cybersecurity Division, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss the new Cybersecurity Quick Start Guide for Small and Medium sized businesses. This session, tailored for SMB's, will discuss the cybersecurity controls that every business should implement in an easy to understand session by the person that is responsible for that Quick Start Guide.The NIST Quick Start Guide for SMB's can be found here: https://www.nist.gov/publications/nist-cybersecurity-framework-20-small-business-quick-start-guideEdited and Produced by David LewisJun 06, 202432:47How to Avoid the Snakes of Financial FraudMatt Quamen, Co-Founder and President of Optimize Cyber, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss practical ways of protecting you and your business from Financial Fraud. Learn the basic things every business owner should do immediately to protect themselves from falling victim to Financial Fraud.May 23, 202430:14Managing Third Party RiskSubject Matter Expert Jason Butler joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to manage Third Party Risk. Learn about the key issues surrounding utilizing Third Parties in your business, and how to minimize and mitigate the associated risk.Edited and Produced by David LewisMay 16, 202423:21Data Driven Computer Defense - Implementation ExamplesPodcast 4: Volume 5: In our final series episode, Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to reveal Implementation Examples of a Data-Driven Computer Defense, which is Part 3 of his new book covering Chapters 9 – 13.Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847Edited and Produced by David LewisMay 02, 202433:16Data-Driven Computer Defense - Mental Maps and Operational FrameworksPodcast 3: Volume 4: Roger Grimes, noted industry author and cybersecurity expert, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Part 2 (Chapters 5 – 8) in his new book, A Data-Driven Computer Defense. In this Episode, Roger and Jeff explore and discuss Mental Maps and Operational Frameworks.Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847Edited and Produced by David LewisApr 25, 202430:03Data Driven Computer Defense - Root CausesThe Data-Driven Computer Defense - Podcast 2, Volume 3. Roger Grimes, noted industry author and cybersecurity expert, returns to join Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Part 1 of his book, A Data-Driven Computer Defense, which covers Chapters 1 – 4. In this Episode, Roger and Jeff explore the Root Causes of Cyber attacks.Learn more about Rogers Book, Data-Driven Computer Defense: https://www.amazon.com/Data-Driven-Computer-Defense-Way-Improve/dp/1092500847Edited and Produced by David LewisApr 18, 202429:03The Identity Crisis Where to start in securing cloud networksJeff Moncrief, Field CTO and Director of Sales Engineering for Sonrai Security and SafeHouse Initiative contributor joins Jeff Edwards, Co-Chair of the Safehouse Initiative to discuss where to start in securing your cloud networks. Discover why identity is the new perimeter in securing cloud networks and what you should do now to secure yours.Edited and Produced by David LewisApr 04, 202428:21Joining the Global Fight - Cyber Resilience Centre for LondonSimon Newman, CEO of the Cyber Resilience Centre for London joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to share what the CRC is doing to help businesses of all sizes and governments throughout the United Kingdom to better prepare for a cyber attack. Simon shares excellent examples of attacks that the CRC has seen and what they've learned from them.Edited and Produced by David LewisMar 28, 202419:18Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 3Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 3 Luke explores how to Fortify your incident response and better prepare for a cyber attack.Edited and Produced by David LewisMar 21, 202417:31Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 2Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 2, Luke explores best practices to Respond to a cyber breach. Learn the elements of a best practice Response as part of your Cyber Response Plan.Edited and Produced by David LewisMar 21, 202422:43Prepare, Respond, Fortify: Incident Response (“IR”) Fundamentals, Part 1Luke Emrich, DFIR Director at Surefire Cyber joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, in a 3 part series to discuss Incident Response Fundamentals including Prepare, Respond and Fortify. In Part 1, Luke explores how to best Prepare your incident response process and the elements of an incident response.Edited and Produced by David LewisMar 21, 202424:32Never let a good crisis go to waste, Part 2Building on Episode 9, Kevin Sandschafer, COO and VP of Cyber Risk and Assurance joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to better prepare and also how to respond to a cyber attack.Edited and Produced by David LewisMar 14, 202419:07Defending yourself against Long Game PhishingNoted industry author and cybersecurity expert, Roger Grimes, joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss how to defend against Long Game Phishing attacks. Learn the insidious, and disturbing nature of a Long Game Phishing attack, and how you can learn to spot and defend against them.Edited and Produced by David LewisMar 08, 202430:15Never let a good crisis go to waste, Part 1 Rob Stewart, Founder and CEO of White Tuque joins Jeff Edwards, Co-Chair of the SafeHouse Initiative, discuss his extensive experience in preparing, responding and learning from cyber events. Rob's saying is "Never let a good crisis go to waste", as you need to prepare for and learn from each of them.This is the first episode of a two part series featuring the experience from White Tuque, a contributor to the SafeHouse Initiative.Edited and Produced by David LewisFeb 29, 202426:15In Perspective: Frameworks, Standards and RegulationsJoin James Hatcher, Asia Pacific Channel Manager for Lansweeper as he discusses with Jeff Edwards, Co-Chair of the SafeHouse Initiative, the meaning and importance of Cyersecurity Frameworks, Standards, and Regulations and what they mean for your business.Edited and Produced by David LewisFeb 13, 202422:04Critical Infrastructure - Successfully Navigating a BreachScott Grayson, CEO of the American Public Works Association (APWA) joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss Cybersecurity in the Public Works industry and ways to successfully navigate a breach.Edited and Produced by David LewisFeb 01, 202420:49When Cybersecurity Collides with AIJeff Crume, IBM Distinguished Engineer, CTO IBM Security Americas, and Cybersecurity Architect joins Jeff Edwards, Co-Chair of the SafeHouse Initiative as they discusses how AI is disrupting Cybersecurity and what to expect in the future.Edited and Produced by David LewisJan 16, 202426:06You've been breached! Now what?Robert Walker, Partner and Chair of the Data Privacy and Cybersecurity Practice at Lewis Brisbois joins Jeff Edwards, Co-Chair of the SafeHouse Initiative to discuss what you need to do in case of a Breach. Lewis Brisbois is a Legal firm and Robert specializes in helping companies with the short and long term issues resulting from a cyber breach or attack.Edited and Produced by David LewisJan 08, 202419:27The Long Tail Issues with a Cyber IncidentIn this episode, David Finz, First Vice President at Alliant Insurance Services returns to our podcast to explore the Long Tail Issues with a Cyber Incident like a Malware, or Ransomware event.Edited and Produced by David LewisDec 12, 202324:03
10 Common Flaws in Incident Response Plans by The SafeHouse (2024)
Top Articles
Latest Posts
Article information

Author: Duane Harber

Last Updated:

Views: 6352

Rating: 4 / 5 (51 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Duane Harber

Birthday: 1999-10-17

Address: Apt. 404 9899 Magnolia Roads, Port Royceville, ID 78186

Phone: +186911129794335

Job: Human Hospitality Planner

Hobby: Listening to music, Orienteering, Knapping, Dance, Mountain biking, Fishing, Pottery

Introduction: My name is Duane Harber, I am a modern, clever, handsome, fair, agreeable, inexpensive, beautiful person who loves writing and wants to share my knowledge and understanding with you.