Incident & Breach Response , Security Operations , Video

Refining Incident Response Playbooks at the Granular Level

Kamal Sharma, (ISC)² Bangalore, on How to Build a Robust Cyber Resilience Program
Kamal Sharma, vice president of (ISC)², Bangalore Chapter

The foundation of a cyber resilience program lies in a well-crafted response plan, but these plans encounter obstacles at the time of execution due to a lack of details and an excessive focus on tools at the expense of people and processes.

According to Kamal Sharma, vice president of the (ISC)² Bangalore Chapter, an effective incident management procedure goes beyond intricate charts and workflows. "The plan revolves around practical aspects such as a comprehensive asset inventory, knowledge of backup locations and clearly assigned responsibilities," he said.

See Also: Combat IT Team Burnout by Embracing Automation

Sharma emphasized the importance of comprehensive and meticulous playbooks that provide guidance at each step of the recovery process. While the prospect of creating playbooks for every possible scenario may seem overwhelming, he advised starting small by assessing the organization's current state, prioritizing action items and gradually expanding the playbooks over time.

In this video interview conducted at Information Security Media Group's Bengaluru Cybersecurity Summit, Sharma discusses:

  • Components of cyber resilience playbook;
  • Building a robust incident response plan;
  • The importance of assessments and associating with partners.

Sharma has 28 years of experience working with leading multinational organizations across infrastructure, technology and cybersecurity domains. His experience spans the areas of managing presales management, service delivery and partner/vendor management for IT and engineering businesses.


About the Author

Shipra Malhotra

Shipra Malhotra

Managing Editor, ISMG

Malhotra has more than two decades of experience in technology journalism and public relations. She writes about enterprise technology and security-related issues and has worked at Biztech2.com, Dataquest and The Indian Express.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.