WEBVTT

0:00:04.060000 --> 0:00:06.940000
 The need for incident response.

0:00:06.940000 --> 0:00:10.520000
 So now that we know what incident response
 is all about, at least at a

0:00:10.520000 --> 0:00:16.580000
 fundamental level, let's take a very
 brief look at, you know, why or why

0:00:16.580000 --> 0:00:21.080000
 incident response is important or I should
 say the need for incident response.

0:00:21.080000 --> 0:00:26.180000
 So again, this is not really that important
 if you are looking at it from

0:00:26.180000 --> 0:00:29.760000
 the perspective of an incident responder
 where you are already working

0:00:29.760000 --> 0:00:36.380000
 as one. This is more so, you know, so
 that you understand regardless of

0:00:36.380000 --> 0:00:40.840000
 your position, whether you are
 a CISO, watching this, etc.

0:00:40.840000 --> 0:00:48.760000
 You know, what the primary reasons,
 what the primary reasons are for,

0:00:48.760000 --> 0:00:52.420000
 you know, incident response or having
 an incident response capability

0:00:52.420000 --> 0:00:55.260000
 within your organization.

0:00:55.260000 --> 0:01:00.440000
 So when I say the need for incident response,
 it really is a need, especially,

0:01:00.440000 --> 0:01:03.000000
 you know, for organizations nowadays.

0:01:03.000000 --> 0:01:08.760000
 So incident response is a, it should be
 a critical part of any organization's

0:01:08.760000 --> 0:01:11.140000
 cybersecurity strategy, right?

0:01:11.140000 --> 0:01:15.980000
 And as cyber threats continue to evolve,
 organizations likewise must be

0:01:15.980000 --> 0:01:20.940000
 prepared to respond quickly and effectively
 to security incidents.

0:01:20.940000 --> 0:01:25.560000
 So what that brings us to is that without
 a structured response capability,

0:01:25.560000 --> 0:01:30.900000
 even a small incident, regardless of what
 that is, can escalate like really

0:01:30.900000 --> 0:01:33.500000
 quickly into a major security breach.

0:01:33.500000 --> 0:01:38.260000
 So it's super important and incident
 response can make something that,

0:01:38.260000 --> 0:01:43.380000
 you know, could be potentially serious
 or critical and help you limit

0:01:43.380000 --> 0:01:50.600000
 it. So the key thing is that the key
 takeaway from this slide is that

0:01:50.600000 --> 0:01:55.220000
 even a small incident can escalate
 into a major security breach, which

0:01:55.220000 --> 0:01:59.700000
 will obviously have severe business, financial,
 and of course, reputational

0:01:59.700000 --> 0:02:04.280000
 consequences. And that is why incident
 response is important because it

0:02:04.280000 --> 0:02:09.860000
 enables organizations to minimize damage,
 recover faster, meet compliance

0:02:09.860000 --> 0:02:13.500000
 requirements. That's also something
 that's quite important, of course,

0:02:13.500000 --> 0:02:18.180000
 and more importantly, I should say, as
 equally as important, build resilience

0:02:18.180000 --> 0:02:20.120000
 against future attacks.

0:02:20.120000 --> 0:02:25.240000
 So you want to be advancing as an organization
 in terms of your cybersecurity.

0:02:25.240000 --> 0:02:28.460000
 You don't want to be staying at the
 same level and, you know, dealing

0:02:28.460000 --> 0:02:31.400000
 with the same types of incidents
 in the same ways.

0:02:31.400000 --> 0:02:34.460000
 You want to be continuously improving.

0:02:34.460000 --> 0:02:40.040000
 And I've sort of outlined, you know, I
 think four or five needs for incident

0:02:40.040000 --> 0:02:44.880000
 response or reasons why your organization
 should have an incident response

0:02:44.880000 --> 0:02:49.400000
 capability. So starting over the first,
 the growing threat landscape.

0:02:49.400000 --> 0:02:53.020000
 So, you know, it goes without saying
 that the volume and complexity of

0:02:53.020000 --> 0:02:58.060000
 cyber threats are increasing daily
 and with the advent and adoption of

0:02:58.060000 --> 0:03:01.280000
 AI, not just by companies,
 but by attackers.

0:03:01.280000 --> 0:03:06.540000
 Attackers are, you know, using increasingly
 advanced techniques that involve

0:03:06.540000 --> 0:03:09.740000
 ransomware, phishing, zero-day exploits.

0:03:09.740000 --> 0:03:13.320000
 And of course, now, supply
 chain attacks, right?

0:03:13.320000 --> 0:03:16.880000
 And the key point is that, and this
 is very important, regardless of who

0:03:16.880000 --> 0:03:20.760000
 you are, what your budget is, the
 scale of your organization.

0:03:20.760000 --> 0:03:26.140000
 No organization is immune, whether that
 be a small business or a startup

0:03:26.140000 --> 0:03:32.380000
 or a mom and pop shop to, you know,
 large enterprises and alike.

0:03:32.380000 --> 0:03:37.600000
 So making a proactive incident response
 capability critical, you know,

0:03:37.600000 --> 0:03:41.000000
 making a proactive response capability
 is critical to defend against these

0:03:41.000000 --> 0:03:46.820000
 modern threats. And the second reason
 or one of the other reasons for

0:03:46.820000 --> 0:03:51.860000
 incident response or, you know, the
 need for that sort of justifies the

0:03:51.860000 --> 0:03:56.240000
 need for incident response is the speed
 of attacks versus the speed of

0:03:56.240000 --> 0:04:01.600000
 response. So I mentioned this in the
 previous slide before we took a look

0:04:01.600000 --> 0:04:06.780000
 at reason one. And that was the fact
 that cyber attacks or incidents can

0:04:06.780000 --> 0:04:08.700000
 escalate in minutes.

0:04:08.700000 --> 0:04:12.720000
 So a phishing email, for example, can
 lead to credential compromise, lateral

0:04:12.720000 --> 0:04:16.180000
 movement and data exaltration
 in under an hour.

0:04:16.180000 --> 0:04:19.360000
 And again, you don't have to take my
 word for this just squared and take

0:04:19.360000 --> 0:04:23.540000
 a look at various breaches and
 analyze the instant timeline.

0:04:23.540000 --> 0:04:27.780000
 And you'll see just how quickly things
 can escalate into, you know, from

0:04:27.780000 --> 0:04:32.100000
 a very small breach, you know, access
 to just one computer on a network

0:04:32.100000 --> 0:04:38.500000
 to the point of, you know, the attacker
 sort of gaining or fully compromising

0:04:38.500000 --> 0:04:42.640000
 the active director environment,
 so on and so forth.

0:04:42.640000 --> 0:04:47.580000
 The key point here is that if an organization
 cannot detect, that's very

0:04:47.580000 --> 0:04:50.300000
 important, but also respond quickly.

0:04:50.300000 --> 0:04:52.540000
 The damage can spiral out of control.

0:04:52.540000 --> 0:04:56.560000
 So something that would have been very
 small had there been an instant

0:04:56.560000 --> 0:05:02.220000
 response capability, you know, would
 essentially ends up being something

0:05:02.220000 --> 0:05:03.760000
 even more critical.

0:05:03.760000 --> 0:05:11.420000
 And I cannot sort of vocalize just how
 severe the difference is or would

0:05:11.420000 --> 0:05:15.480000
 be, you know, we talk about not having
 an incident response capability

0:05:15.480000 --> 0:05:17.900000
 versus having one.

0:05:17.900000 --> 0:05:23.260000
 And finally, just to sort of tie up
 this particular, you know, important

0:05:23.260000 --> 0:05:28.040000
 reason for having or for needing incident
 response is the fact that a

0:05:28.040000 --> 0:05:33.900000
 well-structured incident response process
 ensures faster detection, containment

0:05:33.900000 --> 0:05:39.480000
 and recovery, which, you know, therefore
 or consequently reduces the window

0:05:39.480000 --> 0:05:41.360000
 of opportunity for attackers.

0:05:41.360000 --> 0:05:46.520000
 So, you know, you sort of have to take
 it into stride that no organization

0:05:46.520000 --> 0:05:48.300000
 is immune firstly.

0:05:48.300000 --> 0:05:53.540000
 So without a doubt, you know, there's
 always going to be an incident.

0:05:53.540000 --> 0:05:58.000000
 Now, whether that incident is, you know,
 is small or ends up being, you

0:05:58.000000 --> 0:06:03.860000
 know, big or critical is entirely up
 to the incident response team or

0:06:03.860000 --> 0:06:07.640000
 incident response generally, you know,
 whether or not your organization

0:06:07.640000 --> 0:06:11.280000
 has this capability.

0:06:11.280000 --> 0:06:16.000000
 So we then have business and operational
 impacts, which again is fairly

0:06:16.000000 --> 0:06:19.940000
 obvious. Security incidents can cause
 significant disruptions like system

0:06:19.940000 --> 0:06:22.760000
 downtime, loss of sensitive data.

0:06:22.760000 --> 0:06:24.940000
 That's quite serious.

0:06:24.940000 --> 0:06:29.940000
 Financial loss even more serious, as
 you'll find out, interruption of

0:06:29.940000 --> 0:06:37.040000
 services and of those, as well as customer
 trust, which is a huge thing.

0:06:37.040000 --> 0:06:42.380000
 Are you likely to use a service that,
 you know, that actually got breached?

0:06:42.380000 --> 0:06:46.820000
 Or, you know, are you more likely to
 use this service after the breach?

0:06:46.820000 --> 0:06:49.460000
 You know, these are all very
 important questions.

0:06:49.460000 --> 0:06:53.400000
 Now, you know, incident response, the
 key point is that incident response

0:06:53.400000 --> 0:06:59.980000
 helps mitigate these impacts by restoring
 normal operations faster and

0:06:59.980000 --> 0:07:03.580000
 limiting the reach of the attack
 or the scope of the attack.

0:07:03.580000 --> 0:07:10.080000
 So, you know, without an IR capability
 or with a sort of ad hoc poor IR

0:07:10.080000 --> 0:07:15.240000
 capability, you could have sort of
 a mix of all of these disruptions,

0:07:15.240000 --> 0:07:19.320000
 so system downtime, loss of sensitive
 data, financial loss, pretty much

0:07:19.320000 --> 0:07:23.960000
 everything. But if you have a, you know,
 proper incident response capability,

0:07:23.960000 --> 0:07:28.940000
 I should say capable incident response
 capability, no pun intended there,

0:07:28.940000 --> 0:07:36.060000
 then you sort of limit, you know, not
 just these disruptions listed here

0:07:36.060000 --> 0:07:42.700000
 that tie into the business and operational
 impact, but also, you know,

0:07:42.700000 --> 0:07:46.360000
 you also limit the window as
 listed out in this slide.

0:07:46.360000 --> 0:07:50.880000
 You limit or reduce the window of opportunity
 for the attackers and of

0:07:50.880000 --> 0:07:57.020000
 course, you're able to restore normal
 operations faster and you're also

0:07:57.020000 --> 0:08:05.560000
 limiting the, you're limiting the scope,
 right, of what is affected or

0:08:05.560000 --> 0:08:10.140000
 what the attackers currently
 have access to.

0:08:10.140000 --> 0:08:14.720000
 So, you then have regulatory
 and compliance requirements.

0:08:14.720000 --> 0:08:18.980000
 This is one that sort of goes without
 saying that if your organization

0:08:18.980000 --> 0:08:27.300000
 needs to maintain compliance with specific
 regulatory, you know, standards

0:08:27.300000 --> 0:08:35.600000
 or frameworks like GDPR, hyper, et cetera,
 then incident response is sort

0:08:35.600000 --> 0:08:41.700000
 of required firstly as part of, you
 know, maintaining compliance with

0:08:41.700000 --> 0:08:49.160000
 said compliance standards, but also incident
 response allows you to allows

0:08:49.160000 --> 0:08:53.900000
 you to adhere to these standards in
 terms or in a way of compliance.

0:08:53.900000 --> 0:08:59.640000
 So, regulatory frameworks such as GDPR,
 hyper, PCI, DSS and, you know,

0:08:59.640000 --> 0:09:03.780000
 NIST2, require organizations, as I just
 said, to have an incident response

0:09:03.780000 --> 0:09:08.240000
 plan and report certain incidents
 within specific timeframes.

0:09:08.240000 --> 0:09:13.620000
 And what that means eventually, you
 know, beyond just losing, you know,

0:09:13.620000 --> 0:09:18.760000
 your compliance is that non-compliance
 can lead to heavy fines, like seriously

0:09:18.760000 --> 0:09:23.420000
 heavy fines, lawsuits, and of course,
 goes without saying reputational

0:09:23.420000 --> 0:09:29.020000
 damage. So, what that means or to sort
 of summarize this particular point

0:09:29.020000 --> 0:09:34.740000
 here is that having a robust incident response
 process ensures legal obligations

0:09:34.740000 --> 0:09:39.420000
 are met and regulatory scrutiny
 is handled effectively.

0:09:39.420000 --> 0:09:42.520000
 So, that brings us to
 the end of this video.

0:09:42.520000 --> 0:09:46.480000
 Just wanted to, you know, give you a
 high level view or abstracted view

0:09:46.480000 --> 0:09:51.640000
 as to why incident response is important
 to organizations or for organizations,

0:09:51.640000 --> 0:09:56.740000
 you know, firstly to have, but also
 to continuously build and develop

0:09:56.740000 --> 0:09:57.880000
 as a capability.

0:09:57.880000 --> 0:10:01.680000
 And that's the correct way of thinking
 about incident response within

0:10:01.680000 --> 0:10:02.780000
 an organization.

0:10:02.780000 --> 0:10:04.400000
 It's sort of like a muscle.

0:10:04.400000 --> 0:10:08.020000
 When you start off, it's very weak, you
 know, you're not that coordinated

0:10:08.020000 --> 0:10:12.720000
 or the muscle is not that coordinated,
 but you continually build it and,

0:10:12.720000 --> 0:10:15.880000
 you know, you get better, you can
 start lifting heavier things.

0:10:15.880000 --> 0:10:20.240000
 And that's what incident response
 capability is all about.

0:10:20.240000 --> 0:10:23.040000
 With that being said, that's going
 to be it for this video.

0:10:23.040000 --> 0:10:25.440000
 And I will be seeing you
 in the next video.

