- Does an event qualify as an 'incident' and require a response such as an ethical hack or forensic investigation?
- What do you do with the information obtained during your ethical hack or forensic investigation?
- Who else needs to be involved?
This new discussion board will include topics such as writing your incident response policy, creating your CIRT (Computer Incident Response Team), experiences dealing with an incident, tools and techniques utilized, law enforcement and/or legal involvement, lessons learned with subsequent modifications to the policy and more.
I look forward to your participation,