Cybersecurity incident response

被引:0
作者
Garzón, Fabian [1 ]
机构
[1] CISM, CRISC, GCIH
来源
ISACA Journal | 2020年 / 4卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:49 / 54
相关论文
共 50 条
  • [21] Cybersecurity incident reporting laws in the Asia Pacific
    Nicholas Seng
    [J]. International Cybersecurity Law Review, 2023, 4 (3): : 325 - 346
  • [22] Values and Value Conflicts in the Context of OSINT Technologies for Cybersecurity Incident Response: A Value Sensitive Design Perspective
    Riebe, Thea
    Baeumler, Julian
    Kaufhold, Marc-Andre
    Reuter, Christian
    [J]. COMPUTER SUPPORTED COOPERATIVE WORK-THE JOURNAL OF COLLABORATIVE COMPUTING AND WORK PRACTICES, 2024, 33 (02): : 205 - 251
  • [23] Enhancing cybersecurity incident response: AI-driven optimization for strengthened advanced persistent threat detection
    Ali, Gauhar
    Shah, Sajid
    Elaffendi, Mohammed
    [J]. RESULTS IN ENGINEERING, 2025, 25
  • [24] Enabling cybersecurity incident response agility through dynamic capabilities: the role of real-time analytics
    Naseer, Humza
    Desouza, Kevin
    Maynard, Sean B.
    Ahmad, Atif
    [J]. EUROPEAN JOURNAL OF INFORMATION SYSTEMS, 2024, 33 (02) : 200 - 220
  • [25] Developing decision support for cybersecurity threat and incident managers
    van der Kleij, Rick
    Schraagen, Jan Maarten
    Cadet, Beatrice
    Young, Heather
    [J]. COMPUTERS & SECURITY, 2022, 113
  • [26] Improving Cybersecurity Incident Analysis Workflow with Analytical Provenance
    Rusnak, Vit
    Janeckova, Lenka
    Drgon, Filip
    Dombajova, Anna-Marie
    Kudelkova, Veronika
    [J]. 2022 26TH INTERNATIONAL CONFERENCE INFORMATION VISUALISATION (IV), 2022, : 300 - 306
  • [27] GraphWeaver: Billion-Scale Cybersecurity Incident Correlation
    Freitas, Scott
    Gharib, Amir
    [J]. PROCEEDINGS OF THE 33RD ACM INTERNATIONAL CONFERENCE ON INFORMATION AND KNOWLEDGE MANAGEMENT, CIKM 2024, 2024, : 4479 - 4486
  • [28] Data-Driven Cybersecurity Incident Prediction: A Survey
    Sun, Nan
    Zhang, Jun
    Rimba, Paul
    Gao, Shang
    Zhang, Leo Yu
    Xiang, Yang
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (02): : 1744 - 1772
  • [29] Customized access log classifier for cybersecurity incident detection
    del Castillo, Miguel Perez
    Rial, Gaston
    Sotelo, Rafael
    Gurmendez, Maximo
    [J]. MEMORIA INVESTIGACIONES EN INGENIERIA, 2020, (18): : 47 - 52
  • [30] From incident response to incident response management
    Johnsen, SO
    Rostad, L
    Haugset, B
    Dahl, MB
    [J]. PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 122 - 127