Latest Articles

What Does the New Cybersecurity Policy Mean for the Federal IT Market?

by in News, Security

The government sector has been notoriously slow to adopt modern cyber security measures for a long time. A new report from Netwrix, for example, found that only 14% of government organizations believe they’re well-prepared to face modern cyber threats. What’s more, given the treasure trove of sensitive data sought by hackers that many of these […]

IoT Security: What Are the Threats for Consumers and Manufacturers?

by in Security

The Internet of Things (IoT) is rapidly changing the way both consumers and manufacturers interact with the world. But despite the benefits that these devices allow, they also carry with them critical security vulnerabilities that are putting customers and businesses alike at risk. To put the growth of this industry into perspective, over 34 billion […]

The Top Challenges Facing CISOs

by in Security

As a Chief Information Security Officer (CISO), it’s your responsibility to safeguard your company from cyber security attacks and compromised insider information. But the role of CISO is rapidly changing across the board. While there was certainly a time where such a position was only found in select businesses, both the ease and modern necessity […]

How to Set Up an Incident Response Plan that Actually Works

by in Incident Response

An ever-evolving technological landscape is changing the way we do business and making many processes far simpler with each passing year. But with each advancement in our technology comes a tradeoff: increasingly sophisticated cyberattacks. Malware, phishing, DDoS attacks, drive-by downloads MITMs, malvertising, rogue software – the list goes on. And the effects of a data […]

Being Proactively Prepared for Security Breaches Will Save Your Organization Millions

by in Security

Data breaches and cyberattacks have become commonplace stories in the media today. It seems like every other week, another high-profile company is being crippled by leaked personal records, financial information, and other types of damaging data. And when you consider that the average cost of a data breach is $3.62 million, such a breach can […]

Ryan Corey Joins Board of Directors of the Incident Response Consortium

by in Blog, News

Greenbelt, Md. – August 16, 2017 – Cybrary, the world’s first and only open-source cyber security and IT online learning and certification preparation platform, today announced that Co-Founder, Ryan Corey, has been named to the Board of Directors of the Incident Response Consortium. Ryan Corey, Cybrary Co- Founder The Incident Response Consortium is an educational, […]

[Infographic] Incident Response 2017

by in Blog, Incident Response

IR17 is a conference for cybersecurity professionals to learn and develop playbooks to improve incident response process at their organization. Take a look at the infographic below to see why you should attend Incident Response 2017. Share this Infographic On Your Site </p><br /> <p><strong>Please include attribution to IncidentResponse.com with this graphic.</strong></p><br /> <p><a href=’https://www.incidentresponse.com/infographic-incident-response-2017/’><img […]

How To Create A Cybersecurity Playbook

by in Blog

All organizations have plans for different incidents that could impact the business’s resilience to them if they are not prepared. The purpose of a security playbook is to provide all members of an organization with a clear understanding of their responsibilities towards cybersecurity standards and accepted practices before, during, and after a security incident. Once […]

    IRC

    The First and Only Incident Response Community laser-focused on Incident Response, Security Operations and Remediation Processes concentrating on Best Practices, Playbooks, Runbooks and Product Connectors. In building the Community, the IRC is aimed to provide, design, share and contribute to the development of open source playbooks, runbooks and response plans for the industry community to use. These playbooks or recipes can be in the form of flowcharts, diagrams, sequences, scripts, orchestration platform playbooks and product integration connectors.

    Subscribe to receive updates from the

    Incident Response Consortium