0
Skip to Content
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Japh On Tech InfoSec
Japh On Tech InfoSec
Rules
Licensing
Account
Libaries
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
Rules
Licensing
Account
Folder: Libaries
Back
Threats
MITRE ATTACK Techniques
CIS Control Library
HIPAA Control Library
ISO 27001 Library
NIST Control Library
PCI Control Library
GDPR Library
PSD2 (Payment Services Directive 2) Library
AML&KYC Library
Blog
Archive
About
Search
RC.CO-3: Communications
Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 3/4/25 Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 3/4/25

RC.CO-3: Communications

Recovery activities are communicated to internal and external stakeholders as well as executive and management teams.

Read More
RC.CO-2: Communications
Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 3/3/25 Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 3/3/25

RC.CO-2: Communications

Reputation is repaired after an incident.

Read More
RC.CO-1: Communications
Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/28/25 Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/28/25

RC.CO-1: Communications

Public relations are managed.

Read More
RC.IM-2: Improvements
Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/26/25 Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/26/25

RC.IM-2: Improvements

Recovery strategies are updated.

Read More
RC.IM-1: Improvements
Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/25/25 Network, Incident Response, Investigation, Analysis, Mitigation, Lessons Learned Jeremy Pickett 2/25/25

RC.IM-1: Improvements

Recovery plans incorporate lessons learned.

Read More
RC.RP-1: Recovery Planning
Network, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/24/25 Network, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/24/25

RC.RP-1: Recovery Planning

Recovery plan is executed during or after a cybersecurity incident.

Read More
RS.IM-1: Improvements
Network, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/21/25 Network, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/21/25

RS.IM-1: Improvements

Response plans incorporate lessons learned.

Read More
RS.MI-3: Mitigation
Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/20/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/20/25

RS.MI-3: Mitigation

Newly identified vulnerabilities are mitigated or documented as accepted risks.

Read More
RS.MI-2: Mitigation
Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/19/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/19/25

RS.MI-2: Mitigation

Incidents are mitigated.

Read More
RS.MI-1: Mitigation
Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/18/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis, Mitigation Jeremy Pickett 2/18/25

RS.MI-1: Mitigation

Incidents are contained.

Read More
RS.AN-5: Analysis
Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/17/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/17/25

RS.AN-5: Analysis

Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g., internal testing, security bulletins, or security researchers).

Read More
RS.AN-4: Analysis
Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/14/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/14/25

RS.AN-4: Analysis

Incidents are categorized consistent with response plans.

Read More
RS.AN-3: Analysis
Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/13/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/13/25

RS.AN-3: Analysis

Forensic data is collected.

Read More
RS.AN-2: Analysis
Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/12/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/12/25

RS.AN-2: Analysis

The impact of the incident is understood.

Read More
RS.AN-1: Analysis
Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/11/25 Network, Monitoring, Communication, Incident Response, Investigation, Analysis Jeremy Pickett 2/11/25

RS.AN-1: Analysis

Notifications from detection systems are investigated

Read More
RS.CO-5: Communications
Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/10/25 Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/10/25

RS.CO-5: Communications

Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.

Read More
RS.CO-4: Communications
Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/7/25 Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/7/25

RS.CO-4: Communications

Coordination with stakeholders occurs consistent with response plans.

Read More
RS.CO-3: Communications
Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/6/25 Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/6/25

RS.CO-3: Communications

Information is shared consistent with response plans.

Read More
RS.CO-2: Communications
Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/5/25 Network, Monitoring, Communication, Incident Response Jeremy Pickett 2/5/25

RS.CO-2: Communications

Incidents are reported consistent with established criteria.

Read More
RS.CO-1: Communications
Network, Monitoring, Communication Jeremy Pickett 2/4/25 Network, Monitoring, Communication Jeremy Pickett 2/4/25

RS.CO-1: Communications

Personnel know their roles and order of operations when a response is needed.

Read More
Older Posts

Contact: jeremy@japhontech.com : : japhontech, LLC