Communicating and Documenting Security Incidents

Security incidents are increasing, as is the need to effectively communicate and document security incidents. Learn to be effective in communicating and documenting security incidents so you can help your incident response and compliance teams.
Course info
Level
Beginner
Updated
Jun 8, 2018
Duration
1h 1m
Table of contents
Description
Course info
Level
Beginner
Updated
Jun 8, 2018
Duration
1h 1m
Description

72 hours is all the time you have to report a security breach under the GDPR laws. However, we document and communicate security incidents every day, whether we realize it or not. Due to the growing emphasis on information security from regulations such as the GDPR, HIPPA and state laws in the US and around the world, the volume of communication and documentation necessary for security incidents is going to keep growing. In this course, Communicating and Documenting Security Incidents, you will learn a number of techniques to make your communication more effective. First, you will learn about various types of documenting, ranging from typical support case tickets, all the way through to official reports you might need to send to data protection regulators. Next, you will discover how to tailor your communication to achieve the best results. Finally, you will explore real-world examples to determine how effective the incident communication was in these cases. When you are finished with this course, you will have learned the skills and knowledge of how to effectively communicate and document security incidents.

About the author
About the author

Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.

More from the author
Cybersecurity Threats: Insider Threats
Beginner
2h 2m
13 Oct 2017
Cybersecurity Threats: Ransomware
Intermediate
2h 31m
26 Apr 2017
More courses by Richard Harpur