Your organization was breached. You informed the CSIRT and they contained the breach and eradicated the threat.
What is the next step required to ensure that you have an effective CSRL and a more robust cybersecurity posture in the future?
What is a consideration when performing data collection in Information Security Continuous Monitoring?
A company suffers a data breach and determines that the threat actors stole or compromised 10,000 user
profiles. The company had planned for such a breach and determined the loss would be around $2 million.
Soon after restoration, the company stock suffered a 30% drop and the loss was nearly $20 million. In addition, the company received negative press.
Which area of risk did the business forget to account for?
Which NIST Cybersecurity Framework category ensures that organizational communication and data flows are mapped?
What procedure is designed to enable security personnel to detect, analyze, contain, eradicate, respond, and
recover from malicious computer incidents such as a denial-of-service attack?
During what activity does an organization identify and prioritize technical, organizational, procedural,
administrative, and physical security weaknesses?
What determines the technical controls used to restrict access to USB devices and help prevent their use
within a company?
What should an organization use to effectively mitigate against password sharing to prevent unauthorized
access to systems?
What contains a predefined set of instructions or processes that describes the management policy,
procedures, and written plan defining recovery of information systems?
A company implemented an intrusion detection system. They notice the system generates a very large number of false alarms.
What steps should the company take to rectify this situation?
What supports an organization in making risk management decisions to address their security posture in real time?