CISO Strategies & Tactics For Incident Response

Add bookmark

In CISO Strategies & Tactics For Incident Response, the CSHub community provides feedback on how Incident Response, mindset, strategy, tactics and tech have evolved. And they share their thoughts on where we go from here.

Key discussion areas include:

  • Realizing Distributed Continuity
  • Setting Board Standards & Expectations
  • Flexible Operationalizing Of New Timelines
  • Involving The Value Chain
  • Attaining Remote Hygiene
  • Adapting To The Changing Threat Landscape
  • Security Culture & Consciousness
  • And more

Sneak Peak At Three Insights:

  • “It may be six months, it might be a year, might be two
    years, we’re planning to keep working like this for the
    foreseeable future. And that means having that resiliency
    at home, having that resiliency of your teams at home, or
    wherever they work from. So we’ve had to be more flexible
    in our plans.
    • Tom Kartanowicz, Regional Chief Information Officer - Americas, Commerzbank AG
  • “People don’t necessarily understand how to configure
    their routers or how to change a default password. We
    sent out communications to people and kept it to the
    most basic stuff. They have bank information and all kinds
    of other things on their own personal networks that puts
    them at risk. And so, we’re trying to sell the win of how
    changing the router security helps ‘you and your family,’ as
    well as the company”
    • Lisa Tuttle, Chief Information Security Officer, SPX Corporation
  • “We need better control and visibility of whether users have
    the proper applications and updates and patches to their
    security systems.”
    • Herman Brown, Chief Information Officer, SF District Attorney’s Office

Thank You To Our Contributors:

Sponsored By:

More From Arctic Wolf

Attaining True Managed Risk Visibility From On-Prem To The Cloud

Gain the ability to: Classify assets in an environment to measure and manage risk; Incorporate the r...

2022-08-12 by Seth Adler
Attaining True Managed Risk Visibility From On-Prem To The Cloud

Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visib...

Cloud migration led to cloud evolution which has led to a cloud-first mindset. With a pandemic push,...

2021-03-29 by Seth Adler
Setting The Four Cornerstones Of Cloud Security: Accountability, Strategy, Visibility & Enablement

5 Core Security Functions to Operationalize

By operationalizing your core security functions, you can understand and define how your tools, team...

2020-09-28 by Sam McLane
5 Core Security Functions to Operationalize

Cyber Security Hub Mid-Year Report Interactive Discussion

Following the Cyber Security Hub Mid-Year Report, we come together as a community to discuss and deb...

2020-07-23
Cyber Security Hub Mid-Year Report Interactive Discussion

Practitioner Report On Cyber Security Challenges, Focuses And Spend

An update on challenges, focuses and spend in enterprise cyber security to consider for H2 2020 &...

2020-06-29 by Seth Adler
Practitioner Report On Cyber Security Challenges, Focuses And Spend

Sponsor Page

Recommended