Presentation Template IR For Management
Presentation Template IR For Management
Presentation Template IR For Management
1
What is the ‘IR for management’ Presentation
Template
You are accountable for cyber security at your company.
Sooner or later you’ll experience a security incident and conduct an IR process to detect, contain
and recover.
An important part of this process is communicating it to your management both during the
response itself as well as following its conclusion. While they not necessarily security pros, they
need to have full visibility and knowledge into the event and its potential risk.
The ‘Incident Response (IR) for Management‘ presentation template enables you to easily deliver a
clear and concise reporting on the incident’s status, nature and scope as well as on the overall IR
process.
2
What is the ‘Incident Response (IR) for management’
Presentation Template
The template provides concise reporting tool for each stage that includes high
level status description and business risk overview.
The template is purposely modular enabling you to tailor it to your specific
needs per the specific incident you manage.
3
What does the Template Include?
4
How to Use the Template
• The template is built from tables you need to fill up in respect to your specific use case.
• You are free to split the parts into different sessions according to the incident type and severity
– for example, a long investigation might justify several containment\eradication sessions, while
a short 3-day investigation may result with one session form identification to lessons learned.
• This copy includes demo data to give you some reference. Of course, when you actually put it to
use, make sure that all tables are blank and demo data is removed.
• Remember this is just a template. Feel free to adjust and add or leave tables unused. You are
the one who knows best what’s right for your organization and environment
5
Identification – Threat and Risk
INCIDENT INVESTIGATION
Compromise Privilege Escalation Credential Theft Lateral Movement Data Access Data Exfiltration
Threat V
6
Identification – Onward Steps
THREAT TYPE DEDICATED BUDGET
INVESTIGATION DIRECTIONS
ESTIMATED TIMELINE
7
Containment
ROOT CAUSE THREAT TYPE
8
Eradication - Interim
INTERIM STATUS
Malicious Activity Type XXX endpoints encrypted XXX instances XXX accounts XXX sessions to XXX addresses
Status 54% back in production 92% removed 100% disabled and password 100% blocked
reset
NEXT STEPS
Malicious Activity Type XXX endpoints encrypted XXX instances XXX accounts XXX sessions to XXX addresses
9
Eradication - Final
MALICIOUS INFRASTRUCTURE & ACTIVITY REMOVED
Malicious Activity Type XXX endpoints encrypted XXX instances XXX accounts XXX sessions to XXX addresses
NEXT STEPS
Extortion
Cryptomining
Sabotage
Other (specify)
10
Recovery
Disabled\non available Back to Production
Servers
Apps
Cloud workloads
User accounts
Data
11
Lessons Learned
OVERALL ATTACK IMPACT
Damage Details
Data loss
Production downtime
12
Lessons Learned
FINAL ATTACK TIMELINE
Initial Compromise > Identification Identification > Containment Containment > Eradication Eradication > Recovery
POINTS TO
REPRODUCE
Challenge
POINTS TO
IMPROVE
Recommendation
13