Cybersecurity Incident Response
The impact of cybersecurity incidents, most notably ransomware, can be devastating for almost any organization. From the loss of critical business services to the disclosure of sensitive information, it has become clear that having a process to mitigate harm during an incident is something that is critical for most organization that want to improve the security maturity. This course has been updated to more accurately reflect the incident response landscape as of 2021.
The cybersecurity incident response course is intended for those wishing to develop or critique their incident response processes. The course covers the basics of incident responses processes, risk and documentation, including alignment with both the NZISM and other international security standards in order to achieve best practice. It includes discussion of a number of incident response templates and how to critique of existing incident responses processes.
Target audience and course pre-requisites
The Cybersecurity Incident Response course is aimed at any staff with roles or responsibilities related to incident response, including system owners but also communications, legal and privacy staff. Previous technical knowledge is helpful, but not required for this course.
Specifically, it is recommended that you have the following skills and knowledge before starting this course:
• Have experience with organization-specific IT infrastructure and practices.
• Have an interest in developing an organization-wide cyber-response strategy that extends beyond only technical staff.
• Have some responsibility for incident response processes in your organization.
This course will teach you the core components of organizational incident response in order to reduce risk. It explains common incident attack scenarios both in New Zealand and abroad, and includes guidelines for evaluating the impact of any incident. The course will discuss best-practice cyber-responses to the most common incident scenarios observed, taking into account the size and budget of any organization.
Upon course completion, you will be able to:
• Identify the most common forms of cybersecurity incidents
• Assess the current security maturity level of incident response in your organization
• Identify a number of resources for:
o Incident response process documentation templates
o Best practice technical response
Module 1: Incident Response
• The Incident Response Process
• Basics of documentation
• Preparing for an incident
• Context of incidents in NZ and overseas
Module 2: Preparation
• Standard for incident response
• Creating a strawman incident response plan
• Critiquing an incident response plan
Module 3: Organizational Risks
• Technical responses to incidents
• Organisational responses to incidents
• Common weak links in incident response
About The Trainer
Dr Elf Eldridge is a security consultant for ZX Security. Dr. Eldridge has been working as a penetration tester and security auditor for ~ 5 years, and has extensive experience delivering technology courses to both public and private sector organisations. Previously he taught computer science, engineering, physics and mathematics at Victoria University of Wellington from 2013-2017 after obtaining his PhD through The MacDiarmid Institute for Advanced Materials and Nanotechnology.
You can register for this event via Credit Card online now by using the link below, or alternatively call 0800 252 255 with your Credit Card details.
ITP Corporate Partners and approved organisations can opt to pay by invoice by calling 0800 252 255 or emailing attendee and business details through to [email protected]. Credit criteria and other conditions apply.
No courses are currently scheduled
Indicative cost for public workshops. Please contact us for in-house pricing
|All ITP Financial Members||$300.00 + GST / $345.00 incl GST|
|Staff of Corporate Partners (20% Discount)||$344.35 + GST / $396.00 incl GST|
|Non-Members||$430.43 + GST / $495.00 incl GST|
This is an indicative cost only. Actual cost will be confirmed with you. Minimum numbers and other conditions apply.