back to article The six stages of post-security incident grief avoidance

Security and forensics man Ashley Deuble has outlined the six stages of good incident response that if followed could bring an enterprise in line with Fortune 50 best practice. The Griffith University security manager says the steps of preparation; identification; containment; eradication; recovery, and lessons learned are …

  1. Alister
    Coat

    Six Stages of Incident Response

    Based on detailed research of recent incidents involving large companies, I can confirm that the following are the Six Stages of Incident Response:

    Denial

    Bluster

    Panic

    Grudging Acceptance

    Half-hearted Remediation

    Business As Usual

    1. Anonymous Coward
      Anonymous Coward

      Re: Six Stages of Incident Response

      @ Alister..

      I fixed it for you.

      Denial

      Bluster Blaming

      Panic

      Grudging Acceptance Blaming

      Half-hearted Remediation Blaming

      Business As Usual aka Rinse, Repeat.

      :tiphat:

  2. Anonymous Coward
    Anonymous Coward

    No org has gone under yet

    So let's not bother doing it properly.

    Adobe hack, Sony hack, both big organisations who appear to have suffered no long term ill effect from not doing their job properly.

    Welcome to the future...

  3. Aodhhan

    Nothing new

    Same steps which have been done for more than a thousand years. People have prepared and learned using incident response long before computers were invented.

    Only the details have changed with technology and methods/mechanism of attack.

    Only here, once again Mr. Pauli has confused things by trying to be cute. Grief from an incident is far different than the response. Don't mix them. Also, if people want to avoid grief... they need only follow one step: Stop breathing.

  4. Anonymous Coward
    Linux

    The six stages of good incident response

    "Ashley Deuble has outlined the six stages of good incident response"

    How about having an irrevocable audit trail so as you can tell who got in, what did they do and when did they do it, without which any kind of post incident response is worthless.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like