Preparing for Your Data Breach—Yes, It's Coming
Dave Ries; Clark Hill PLC
- Center for Internet Security, CIS Controls, Version 7 (2018) (CIS Control 19 - Incident Response and Management)
- Federal Trade Commission, Data Breach Response: A Guide for Business (September 2016)
- International Organization for Standardization, ISO/IEC 27035-1:2016, Principles of incident management and ISO/IEC 27035-2:2016 Guidelines to plan and prepare for incident response
- Luttgens, Pepe & Mandia, Incident Response & Computer Forensics: Third Edition (McGraw-Hill Education, 2014)
- Michigan Bar Journal, What to Do When Your Data is Breached, pages 54-57. © Sharon D. Nelson, David G. Ries, and John W. Simek 2016–2018. All rights reserved. Posted with permission.
- National Institute of Standards and Technology, Framework for Improving Critical Infrastructure Cybersecurity: Version 1.1 (April 16, 2018) (includes detect, respond, and recover for security incidents and data breaches)
- The Sedona Conference, The Sedona Conference Incident Response Guide, Public Comment Version (March 2018)
- US Department of Health and Human Services, Office for Civil Rights, A Quick-Response Checklist (June 2017)
- US Department of Justice, Cybersecurity Unit, Best Practices for Victim Response and Reporting of Cyber Incidents (April 2015)
John Simek; Sensei Enterprises, Inc.
John Hellerman; Hellerman Communications LLC
Dave Wong; Mandiant, a Division of FireEye
|