01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Speed as an action<br />

When a security breach or cyberattack occurs, an immediate response is required. The longer it takes to<br />

address the threat, the more damage may be done. Studies show that 56% of IT managers take more<br />

than 60 minutes to get information about an ongoing cyberattack. But a lot of damage can be done in an<br />

hour.<br />

Speedy reaction must be a part of your security-forward culture. That means you need to develop an<br />

early recognition of the potential risks, an immediate identification of the attacks and breaches, and a<br />

rapid response to security incidents. When it comes to risk containment, speed is of the essence<br />

Incident Response Plan<br />

Last but not least, It is required to develop an incident response plan, focusing on the priority of risks<br />

previously identified. You need to know what you need to do when a threat is detected—and who needs<br />

to do it. This plan should be codified so that even if an incident occurs after you've personally left the<br />

company, the team currently in place will have a roadmap for how to respond.<br />

About the Author<br />

Adriano Novaes is a senior cybersecurity consultant with more than 15<br />

years of experience in the <strong>Cyber</strong> security space. He is experienced in<br />

Governance, Risk and Compliance and strong expertise in the<br />

information security projects involving IT Risk Management, Network<br />

Security, IT vulnerability management besides providing security advice<br />

in information assets to Brazilian and international companies across the<br />

world. Adriano has worked in multiple projects from different clients in<br />

Brazil, Africa and The United States. He is graduated in Network<br />

Technology and certified as <strong>Cyber</strong>security specialist by Georgia Institute<br />

of Technology in the US. Adriano Novaes can be reached out online at<br />

adriano.novaes@yahoo.com.br or https://www.linkedin.com/in/adrianonovaes<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 47<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!