The phishing incident response playbook contains all 7 steps defined by the NIST incident response process: Prepare, Detect, Analyze, Contain, Eradicate, Recover, Post-Incident Handling.
In the future, you will be able to create your own playbook and share them with your colleagues and the Incident Response community here at IncidentResponse.org.Download Playbook - PDF Download Playbook - VISIO
It's time to share your playbook with your team or your industry peers. Share them, review them, discuss them, use them to help you automate your response.
Suggestions, feedback and other questions? Feel free to contact us at: