Incident Management Process: A Step by Step guide

preview_player
Показать описание
If you're looking to learn more about how incident management works in an organization, then this video is for you! By the end of this video, you'll have a better understanding of the process and how to manage incidents effectively!. This process helps to manage and respond to incidents in a coordinated and effective manner. This will provide you with an understanding on how the process works, and how to properly implement it when necessary.

Incident Management Process Questions

0:00 Introduction
1:03 Incident Management Process
1:20 Incident vs Event
2:53 Policy
3:30 Team
5:23 Detection Analysis
7:08 Containment

7) Building Privacy Management System in Organization
8) How BCP Works

Data Privacy Management System Video

ISO 27001

How to Conduct Internal Audit

Follow me on Instagram

Follow me on Facebook

For Interview based video

#privacy #dataprivacy #cybersecurity #infosec
#cybersecurity #infosec #cissp #ccsp #cisa #cism #isc2 #pentesting
Рекомендации по теме
Комментарии
Автор

One of the most crisp MIM information shared

sangeetabanerjee
Автор

Hey Prab Nair, You probably won’t remember me but I was the lady asking of what resources to use in acing the CCSP exam. I’m glad to say that I passed it! 😊🎉 thank you.🙏

paulineoduah
Автор

Thank you so much for this! I have an interview for an Incident Handler position today and this helped me to prepare for it.

BramSLI
Автор

Thank your very much to provide comprehensive and informative incident management process.

hashimmahmud
Автор

Great examples . Very helpful easy to understand - Thank you

playtale
Автор

Amazing as always Prabh Nair guru ji. You are doing amazing work for InfoSec community.

HSingh-nb
Автор

Thank you for explaining this topic, Brilliantly taught !

DaljeetSinghh
Автор

illustrationstions...awaiting more videos with examples

darshan
Автор

more clear explanation ...Thanking you

syedessan
Автор

calm composed and thoughtfull .. very very impressive and exmaples are top notch .. nice one BRO

BreakMotivation
Автор

But I have a query, in "Domain 2 ISC2 CC Practice Questions" you have started this process from "Detect and Analysis" and separate "Containment/Eradication and Recovery". Do these both processes different ?

sankygupta
Автор

Thank you for all your help, quick question "what can be the root cause that an incident form is not populating the determine or configured fields? for example is not populating the CI, the category, subcategory, support group etc, or even better those fields are grayed out, how do i fix this issue?

javyeracosta
Автор

WOW PRABH it is really a cool approach

balav
Автор

super brother helpful 10 mins before exam

RashedShariff
Автор

woww, this is amazing and well taught

fatmtirfana
Автор

wow...CISM domain 4 crystal clear in 10 min brilliant

auuc
Автор

Informative, Please make incident recovery in more details

hanfiachoudhary
Автор

Thanks Prab, Can you share a video, steps to take up career in cyber security. I have been a sales and marketing professional for 20 years. I am not interested on the technical side. Can you guide me, steps to go forward.

sreenisss
Автор

please make a video on threat vulnerability management process

lalitjan
Автор

thank you but i need how to do major incident assessment report for banking industry from beginning to end

abdikebede