Ms. Peretti suggests detailed incident response, breach response and breach notification plans; a breach response checklist is essential to "knowing what steps to take in the initial stages so that you can ensure the proper decisions are being made in how to approach the investigation."
"Hire investigators that can apply big data to forensics "so a five-month investigation can turn into a five-week investigation."She outlines a number of common mistakes organizations make during breach investigations. Among them are failing to preserve all the evidence as well as not applying big data to forensics "so a five-month investigation can turn into a five-week investigation."
Organizations can now utilize low-cost on-demand SaaS big data analytics services for rapid answers during a breach investigation.
Learn how Veriphyr Identity and Access Intelligence delivers data breach insights - with no hardware and no on-site software.Sources:
(a) Building a 'Defensible' Breach Response - www.BankInfoSecurity.com, 10/23/2013