Incident Management Communication Analysis

684 Words2 Pages

Communicate with incident responders during the response Communication and coordination play an important role in incident response and it is critical that BMF has a coordination plan in place to ensure that my team is ready to handle the incident. BMF coordination plan designates myself, a senior security analyst, as incident coordinator for the incident response program. Therefore, it is my responsible in handling all communications as to the incident response procedures. I would begin with a conference call with key members from different departments such as Help Desk, Information Security, Legal Counsel, Human Resource, Network Engineers, and Financial Department, by calling primary point-of-contact (POC) from the contact list in the Incident …show more content…

This can guarantee that all resources are utilized and information can be distributed appropriately. I do have a list of POCs that comprises of individuals’ phone numbers and email addresses from each department within the BMF – to ensure all key members can be contacted in case of an emergency. If possible, text messaging and incident notification tracking system can be used to communicate with team members and management. However, I would communicate via the medium that is least expected to have been compromised. For example, if the attack may have compromised email system, I won’t use it (Zeltser, 2010).
Management communication - Who to call and when
For BMF senior leadership communication, my incident response team categorizes issue into the 4 different level as following (Suhy, 2017):
- Category one: A threat to public safety or life, disruption of BMF business continuity, critical business process of communication, and financial data theft.
- Category two: A threat to sensitive data, disruption of non-critical BMF operations, non-intrusion activities such as spoofed email addresses.
- Category three: A threat to computer systems, has little impact to BMF operations. For instance, constant virus detection and isolate to keep the virus from spreading to other systems in the

Open Document