mail analysis and applying some investigation techniques.
Idan Abergel’s Post
More Relevant Posts
-
Understanding your system through incident analysis: learn how it works by discovering how it breaks
To view or add a comment, sign in
-
Seeking Advice on what certs to get if you want to do incident response analysis.
To view or add a comment, sign in
-
Quick problem resolution in surveying starts with preventive tactics. Stay ahead by identifying potential issues early and addressing them proactively!
To view or add a comment, sign in
-
Question : How many methods of RC Analysis for Incident investigation And which methods did you use to investigate the incidents?
To view or add a comment, sign in
-
If you could use only one type of analysis (technical or fundamental), which would you rely on?
To view or add a comment, sign in
-
In 233 days, the date will arrive: on 17th January 2025, DORA (the Digital Operational Resilience Act) will come into effect. A key component of DORA is ICT-related incident management. It is therefore important to correctly classify ICT incidents and understand when an incident is considered "major" as this will have implications for the subsequent steps you need to take. In this e-paper, we provide you with a clear overview of when an incident is considered major and how you are expected to handle it. #WorkHardPlayHard
DORA - Classification of major incidents
projectivegroup.ambsdr.io
To view or add a comment, sign in
-
In 233 days, the date will arrive: on 17th January 2025, DORA (the Digital Operational Resilience Act) will come into effect. A key component of DORA is ICT-related incident management. It is therefore important to correctly classify ICT incidents and understand when an incident is considered "major" as this will have implications for the subsequent steps you need to take. In this e-paper, we provide you with a clear overview of when an incident is considered major and how you are expected to handle it.
DORA - Classification of major incidents
projectivegroup.ambsdr.io
To view or add a comment, sign in
-
In 233 days, the date will arrive: on 17th January 2025, DORA (the Digital Operational Resilience Act) will come into effect. A key component of DORA is ICT-related incident management. It is therefore important to correctly classify ICT incidents and understand when an incident is considered "major" as this will have implications for the subsequent steps you need to take. In this e-paper, we provide you with a clear overview of when an incident is considered major and how you are expected to handle it.
DORA - Classification of major incidents
projectivegroup.ambsdr.io
To view or add a comment, sign in
Security Operations Center Analyst at Citadel Cyber Security
6moמקצוען!