Analyze suspicious web or email files for malicious code discovered through SPAM email monitoring and any other available sources.

More Uses of the Computer Security Incident Management Toolkit:

  • Be certain that your organization provides timely and relevant updates to appropriate stakeholders and key decision makers.
  • Coordinate and advise on incident response actions taken by Incident Response Handlers for incidents affecting areas.
  • Manage to reach your full potential, whatever your specialty.
  • Standardize: implementation, training, and sop development and maintenance of implemented solutions.
  • Evaluate: incident response coordination.
  • Warrant that your business validates and maintains incident response plans and processes.
  • Confirm your organization analyzes potential impact of new threats and communicates risks via appropriate channels.


Categories: Articles