Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
- Provides readers with a complete handbook on computer incident response from the perspective of forensics team management
- Identify the key steps to completing a successful computer incident response investigation
- Defines the qualities necessary to become a successful forensics investigation team member, as well as the interpersonal relationship skills necessary for successful incident response and forensics investigation teams
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Introduction and definitions
The Stages of Incident Response
Security Incident Response Team Members
Incident Evidence
Incident Response Tools
Incident Response Policy and Procedures
Legal Requirements and Considerations
Government Policy and Procedures
Forensics Process
Forensics Team Requirements
Forensics Team Policy and Procedures
Management of Forensics Evidence Handling
Forensics Tools
Legalities of Forensics
Forensics Team Oversight
Corporate Management
Relationship Management
Conclusion
Leighton Johnson, the CTO of ISFMT (Information Security Forensics Management Team), a provider of cybersecurity & forensics consulting and certification training, has presented computer security, cyber security and forensics lectures, conference presentations, training events and seminars all across the United States, Asia and Europe. He has over 40 years' experience in Computer Security, Cyber Security, Software Development and Communications Equipment Operations & Maintenance; Primary focus areas include computer security, information operations & assurance, incident response & forensics investigations, software system development life cycle focused on testing of systems, systems engineering and integration activities, database administration and cyber defense activities.