Sep 26, 2014
It is often law enforcement that finds evidence of a security
breach first. Being able to respond effectively to breaches can
reflect on an organization's reputation.
There is always malware running somewhere. Some enterprises have Security Response Teams, but many do not. If it is a one-man shop should they be a 'doer' or a 'coordinator?' If it is a large team, how should it be structured? What is the role of third parties and can open source tools be used?
securitycurrent's Vic Wheatman speaks with Gartner Research Vice President Dr. Anton Chuvakin on this business critical issue.