Analyze suspicious web or email files for malicious code discovered through SPAM email monitoring and any other available sources.

More Uses of the Computer Security Incident Management Toolkit:

  • Ensure your corporation validates and maintains incident response plans and processes.
  • Be certain that your project provides timely and relevant updates to appropriate stakeholders and key decision makers.
  • Coordinate and advise on incident response actions taken by Incident Response Handlers for incidents affecting areas.
  • Manage to reach your full potential, whatever your specialty.
  • Warrant that your operation analyzes potential impact of new threats and communicates risks via appropriate channels.
  • Coordinate: implementation, training, and SOP development and maintenance of implemented solutions.
  • Devise: incident response coordination.


Categories: Articles