Incident Response

Incident Response

We want to ensure our clients are prepared for any possible security incident that may arise. Our team of specialists will create an Incident Response Program for you to address compromised computer security capabilities as well as help educate you on how to go about handling incidents efficiently and effectively. Computer security incident handling can be divided into six phases: preparation, identification, containment, eradication, recovery, and follow-up. Understanding these stages, and what can go wrong in each, facilitates responding more methodically and avoids duplication of effort. We’ve created a program outlined below to address these needs. We will help create and offer guidance on forming and operating a Computer Security Incident Response Team (CSIRT) for you.

INCIDENT RESPONSE PROGRAM AND DELIVERABLES INCLUDE:

  • Incident Response Policy
  • Security Incident Response Guidelines
  • Security Incident Response Log
  • Security Incident Response Confidentiality Acceptance Form
  • Incident Data Loss and Reporting Procedures

We take it upon us to interview company individuals and conduct research to assist in the Incident Response Program. By creating testing environments with the CSIRT team, we’ll ensure the program meets the exact needs of each client.

Search

Get in Touch

Whiteleaf Group Ltd

AEnd of Mugo Kabiru Road, Off Ngong Road, Nairobi, Kenya

T (254) 0 20 4403760