Computer Incident Response and Forensics Team Management

  • ID: 2534666
  • Book
  • 352 Pages
  • Elsevier Science and Technology
1 of 4
Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members.

Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.

  • Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
  • Identify the key steps to completing a successful computer incident response investigation
  • Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams
Note: Product cover images may vary from those shown
2 of 4

Introduction and definitions

The Stages of Incident Response

Security Incident Response Team Members

Incident Evidence

Incident Response Tools

Incident Response Policy and Procedures

Legal Requirements and Considerations

Government Policy and Procedures

Forensics Process

Forensics Team Requirements

Forensics Team Policy and Procedures

Management of Forensics Evidence Handling

Forensics Tools

Legalities of Forensics

Forensics Team Oversight

Corporate Management

Relationship Management


Note: Product cover images may vary from those shown
3 of 4


4 of 4
Johnson, Leighton

Leighton Johnson is the CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), a provider of computer security, forensics consulting & certification training. He has over 38 years experience in Computer Security, Software Development and Communications Equipment Operations & Maintenance. Primary focus areas have included computer security, information operations & assurance, software system development life cycle focused on modeling & simulation systems, systems engineering and integration activities, anti-terrorism/cyber terrorism, database administration, business process & data modeling. He just completed service as the AT/COOP task lead for a DOD Field Agency, based in Alexandria, VA. He recently was the CIO for a 450 person directorate within Lockheed Martin IS&GS covering 9 locations within the Eastern and Midwestern parts of the U.S. He previously served as Security Operations Program Manager for a US DOD Field Agency, based in Arlington, VA.

He is a member of the CSA CloudSIRT working group developing the model for response collaboration among cloud providers, responders and users; the CSA Security-as-a-Service working group developing the definitions for SECaaS requirements and models, as well as a member of the IEEE Education working groups on Cloud and on Computer Software Security. He recently served as a member of the IS Alliance - NIST joint working group on VOIP SCAP security. He has taught Digital and Network Forensics courses at Georgia Regents University. He holds CISM (Certified Information Security Manager), CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CIFI (Certified Information Forensics Investigator), CSSLP (Certified Secure Software Lifecycle Professional), CAP (Certified Authorization Professional), CRISC (Certified in Risk & Information Systems Control), CMAS (Certified Master Antiterrorism Specialist), CAS-CTR (Certified Antiterrorism Specialist - Cyber Terrorism Response) and MBCI (Certified Member Business Continuity Institute) credentials.

Note: Product cover images may vary from those shown
5 of 4
Note: Product cover images may vary from those shown