Showing 1 - 10 of 41 results for Incident Handling
In this 2003 handbook, the authors describe different organizational models for implementing incident handling capabilities.
This 2003 report describes different organizational models for implementing incident handling capabilities, including each model's advantages and disadvantages and the kinds of incident management services that best fit with it.
Roberta “Bobbie” Stempfley, who was appointed director of the SEI’s CERT Division in June 2017, discusses a technical strategy for cybersecurity.
This quick reference guide helps NatCSIRTs deal with DDoS attacks.
These resources help you to get started when creating a new CSIRT.
Tim Shimeall and Timur Snoke, researchers in the SEI’s CERT Division, examine the role of the network traffic analyst in capturing and evaluating ever-increasing volumes of network data.
Tracy Cassidy and Carrie Gardner, researchers with the CERT National Insider Threat Center, discuss research on using technology to detect an employee’s intent to cause physical harm.
This form is to be used for recommendations during the Computer Security Incident Handler(CSIH) application review phase.
This form is to be used along with a payment for renewing certification for a Certified Computer Security Incident Handler (CSIH) or Certified PSP Developer.
Jared Ettinger describes preliminary findings and best practices in cyber intelligence identified through a study sponsored by the U.S. Office of the Director of National Intelligence.