0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
A.16.1.7: Collection of Evidence
Procedures, Incident, Response, Events, Logs, Analysis, Identification, Collection Jeremy Pickett 2/18/25 Procedures, Incident, Response, Events, Logs, Analysis, Identification, Collection Jeremy Pickett 2/18/25

A.16.1.7: Collection of Evidence

Define and apply procedures for the identification, collection, acquisition, and preservation of information, which can serve as evidence.

Read More
A.16.1.6: Learning from Information Security Incidents
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/17/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/17/25

A.16.1.6: Learning from Information Security Incidents

Collect and use information about information security incidents to improve the response process.

Read More
A.16.1.5: Response to Information Security Incidents
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/14/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/14/25

A.16.1.5: Response to Information Security Incidents

Respond to information security incidents in accordance with the documented procedures.

Read More
A.16.1.4: Assessment of and Decision on Information Security Events
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/13/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/13/25

A.16.1.4: Assessment of and Decision on Information Security Events

Assess information security events and decide if they are to be classified as information security incidents.

Read More
A.16.1.2: Reporting Information Security Events
Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/12/25 Procedures, Incident, Response, Events, Logs, Analysis Jeremy Pickett 2/12/25

A.16.1.2: Reporting Information Security Events

Ensure that information security events are reported through appropriate management channels as quickly as possible.

Read More

Contact: jeremy@japhontech.com : : japhontech, LLC