Skip to Main Content
×
Visitors, please read the Law Library's Visitors Policy for updated visitor's requirements.
If research assistance is needed, please do not visit the library without receiving confirmation of your appointment from a library staff member.
Incident Response
IT Risk and Resilience—Cybersecurity Response to COVID-19
Article outlining how COVID-19 pushed many businesses to an online platform not previously used and the cyber security risks that imposed and how that was responded to.
Breaking Down Silos Between Business Continuity and Cyber Security
Article examining the methods businesses and business continuity planners can take to establish safeguards against threats of cybersecurity based on prior resposnes and incidents that have occurred
SOTER: A Playbook for Cyber Security Incident Management
"Article examining SOTER, a playbook for managing cyber security incidents, especially cyber security
operations centre cyber incidents"
Coordinated Cybersecurity Incident Handling: Roles, Processes, and Coordination Networks for Crosscutting Incidents
Article that proposes building on existing work in the cybersecurity field by modifying linear life cycles into a distributed, concurrent, loosely coupled, and action driven framework that can manage multiple, simultaneous, and complex events. By reevaluating existing processes, mapping them to relevant decision support process models, identifying functional user roles, and incorporating information elements from existing taxonomies and data formats, we describe a coordination network process model for crosscutting cybersecurity incidents.
Developing an Incident Response Plan to Maintain Business Continuity
eBooks by "Metricstream" analyzing what an Incident Response Plan is in terms of cybersecurtiy, why response plans are important for business continuity and how to develop an incident response plan for your business.
Incident Response Preparation Phase in Cybersecurity
Article examining incident response prepartaion and the role of continuous assessment of plans.
Cybersecurity in Business