Operations | Monitoring | ITSM | DevOps | Cloud

Why an incident response plan is a security must-have for every organization

“By failing to prepare, you are preparing to fail. Preparation prior to a breach is critical to reducing recovery time and costs.” (RSAConference) For 83% of companies, a cyber incident is just a matter of time (IBM). And when it does happen, it will cost the organization millions, coming in at a global average of $4.35 million per breach. The damage isn’t only financial, nor solely related to customer loyalty and brand equity.

Common Incident Terminology

Operations, customer support, engineers and most groups use inconsistent language. This is a serious problem. Imagine NASA doing that with astronauts or a navy with ships talking to each other, but not using the same terms. Something very bad will happen. In our space of incident management, we use words like broke, failed, outage, doesn’t work, dead…all describing the same condition.

DataScan transforms incident response & business continuity tests

With more than $80 billion of loan collateral in its systems, DataScan is an industry leader in providing solutions for wholesale asset financing and inventory risk management. The company’s InfoSec leadership understood that they needed to take a whole new approach to incident response and to advance its security maturity. Having multiple tools for managing incidents and conducting business was translating into inefficiencies, prolonged resolutions, and stress.

Incident Innovation: ITSM Incident Management vs FEMA Incident Command System - Goals

The FEMA Incident Command System responds to wide area disasters like an earthquake, fire, flood, hurricane, and tornado, while ITIL is used for digital services and applications. In large organizations, there is the facilities team and the data center team. FEMA is associated with the facilities team and ITIL with the smaller data center team. What characteristics are shared between the two and what are the main differences?

A multi-billion-dollar software giant leverages Exigence to improve incident management collaboration & outcomes

A global leader in SaaS-based and on-premise software solutions that power innovative digital experiences was looking to replace the internal tool that was being used for resolving outages, service degradation, data center connection loss, and other incidents.

Key takeaways from MIM Expo 2022 for incident management professionals

The MIM Expo (Major Incident Management) always delivers, and this year’s recent gathering was no exception. At this annual event, we always get a unique opportunity to hear about what’s top of mind with major incidents and SRE professionals from all the world.

What you need to know & do to be a world-class cyber incident responder

World-class incident responders are a strategic asset in today’s world where the frequency and sophistication of cyber security attacks continue to increase every year, as do the associated financial damages: As such, more and more organizations are looking to grow their cyber incident response expertise, both with inhouse staff as well as by engaging with third-party experts.

Key considerations before signing up for cyber insurance

With 2021 seeing 5.1 billion records breached and an annual increase in attacks at 11%, the risk of security incidents is only getting greater every year. And when an attack hits, the cost to recover, which includes fines, penalties, legal fees, and much more, are also great. To help minimize the scope of financial damage, many organizations turn to cyber insurance. Albeit a relatively new branch of insurance, demand is already huge and ever increasing.

Three communications best practices for incident handlers

The importance of well-managed communications when handling IT and security incidents cannot be overstated. If updates are not communicated in a timely and accurate manner, misunderstandings, misalignment, and costly errors will occur. Not to mention, resolution will be prolonged. And if highly sensitive information is communicated to those who should not be privy to such, then the risk of legal ramifications is high, as would be the damage.