Incident Management and Response 1 Day

Information security incidents generally refer to computer data leakage or incidents threatening the availability, integrity and confidentiality of an information system.

Business environments are inter-networked with public and private networks, providing additional opportunity for unauthorized access. Barriers, alarms and alerts, network layering, and system and perimeter security provide a level of security; however, internal and external security breaches continue to occur because of new threats and vulnerabilities. The response to these incidents is a critical component of business continuity, risk management, the maintenance and management of the security infrastructure, and, in some cases, compliance with rules and regulations.

There is no guarantee that even the best possible controls will prevent disruptive and sometimes even catastrophic incidents from occurring. Adverse events such as security breaches, power outages, fires and natural disasters can bring IT and business operations to a halt. Incident management enables a business to respond effectively when a potential or real incident occurs, to continue operations in the event of disruption, and to survive interruptions or security breaches in information systems.

This course helps learners to develop capacity to ensure a consistent and effective approach to the management of Information Security Incidents, including communication on security events and weaknesses. It enables organisation the efficient and effective management of Information Security Incidents by providing establishing an Information Security Incident and a structure for the reporting and management of such incidents.


Course Content

Incident management concepts


Incident management metrics and indicators


Defining incident management procedures


Incident response capability


Developing an incident response plan


Developing/testing response and recovery plans


Documenting events


and more...

1. Risk managers.
2. Security professionals with front-line experience.
3. Security auditors.
4. Information security staff.
5. Compliance personnel.
6. Information security managers.
7. CSOs, CISOs and CIOs.
8. Information security assurance providers.
1. Plan, establish and manage the capability to detect, investigate, respond to and recover from information security incidents to minimize business impact.

2. The course helps learns to develop effective information security incident management in order to help protect the confidentiality and integrity of its information assets, availability of its information systems and services, safeguard the reputation of the organisation and fulfil its legal and regulatory obligations.