Analyze suspicious web or email files for malicious code discovered through SPAM email monitoring and any other available sources.
More Uses of the Computer Security Incident Management Toolkit:
- Be certain that your organization provides timely and relevant updates to appropriate stakeholders and key decision makers.
- Coordinate and advise on incident response actions taken by Incident Response Handlers for incidents affecting areas.
- Manage to reach your full potential, whatever your specialty.
- Standardize: implementation, training, and sop development and maintenance of implemented solutions.
- Evaluate: incident response coordination.
- Warrant that your business validates and maintains incident response plans and processes.
- Confirm your organization analyzes potential impact of new threats and communicates risks via appropriate channels.