SOTER, a cyber security incident management playbook, is developed to provide a comprehensive model to manage cyber security incidents, particularly for the cyber security operations centre. The proposed playbook is adaptive, cross-sectorial, and process driven. Each key components of the incident management playbook are outlined and discussed. Further, a lexicon based on equivalence mapping is developed and used to map existing cyber security incident vocabulary and taxonomy into a common and consistent lexicon to aid understanding among incident management stakeholder communities – national, government and private sectors. A versatile workbook model has been explored which proves to be adaptable to serve a wide range of cases for successf...
Cyber Security Operations Centres (SOCs) are attracting much attention in recent times as they play ...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Industrial reports indicate that security incidents continue to inflict large financial losses on or...
The incident response security playbook\u27s objective is to offer all employees an organization wit...
Without a predefined playbook, a speedy and effective response to cybersecurity incidents is almost ...
The increasing dependency of modern society on IT systems and infrastructures for essential services...
Information Security is an important aspect of decision making in organisations today. Organisations...
Cyber security incident handling is a consistent methodology with which to ensure overall business c...
Cyber security operations centre (CSOC) is a horizontal business function responsible primarily for ...
Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an i...
This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
This thesis examines the cybersecurity incident response problem using a socio-technical approach. T...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Cybersecurity event management is critical to the successful accomplishment of an organization’s mis...
Cyber Security Operations Centres (SOCs) are attracting much attention in recent times as they play ...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Industrial reports indicate that security incidents continue to inflict large financial losses on or...
The incident response security playbook\u27s objective is to offer all employees an organization wit...
Without a predefined playbook, a speedy and effective response to cybersecurity incidents is almost ...
The increasing dependency of modern society on IT systems and infrastructures for essential services...
Information Security is an important aspect of decision making in organisations today. Organisations...
Cyber security incident handling is a consistent methodology with which to ensure overall business c...
Cyber security operations centre (CSOC) is a horizontal business function responsible primarily for ...
Inevitably, all systems are vulnerable, and none are impervious to attack. Incident response is an i...
This paper aims to enhance the security and resilience of Critical Information Infrastructures (CIIs...
There are increasing obligations on companies to report cybersecurity incidents to national and int...
This thesis examines the cybersecurity incident response problem using a socio-technical approach. T...
As nations recognize that their critical infrastructures have integrated sophisticated information a...
Cybersecurity event management is critical to the successful accomplishment of an organization’s mis...
Cyber Security Operations Centres (SOCs) are attracting much attention in recent times as they play ...
Abstract: Traditional cyber-incident response models have not changed signifi cantly since the early...
Industrial reports indicate that security incidents continue to inflict large financial losses on or...