A company is breached - what happens next?

preview_player
Показать описание


🔗 Resources:
SOC Analyst Resources:
SOC Analyst Training (affiliate):

⏰ Timestamps:
0:00 - Introduction
0:53 - Step 1: Breach Response Team
2:16 - Step 2: Containment
4:13 - Step 3: Eradication
5:20 - Step 4: Damage Assessment & Recovery
7:02 - Step 5: What Happened (Forensics)?
8:30 - Step 6: Notify Authorities
9:15 - Step 7: Notify Customers & Partners
9:50 - Step 8: Lesson's Learned
10:27 - Conclusion

🐕 Follow Me:

🤔 Have questions, concerns, comments?:

🎧 Gear:

💻 Cybersecurity PC Build Parts
Рекомендации по теме
Комментарии
Автор

This video just answered my long lingering thought of how the tools and techniques are applied in an event of a data breach/malware attack. Thank you for the detailed explanation.

oiflfzp
Автор

Another incredible video, love your content Grant. As a cyber security student on his way to graduating in the winter you've definetly been a great help.

hadesthegood
Автор

Great breakdown. I currently work in an Incident Response / CSOC position. For large companies, 3rd party vendors or subsidiaries are a big concern for security because you don’t always have full visibility into their systems.

cybercam
Автор

Nice video, can you share that playbook ?

johnpavith
Автор

A company is breached - what happens next?

Cybersecurity YouTubers make a video about it.

hariienesharumugam
Автор

need more of them acting videos haha love your vids bro very helpful

nest
Автор

Sir do you earn 200k dollars a year? Plz reply. Thanks a lot.

gourabsarker
Автор

so i wonder did AT&T violate HIPAA? considering we are just hearing about the breach1.5 -2 yrs later

soulssearching
visit shbcf.ru