<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management in CPE Opportunities</title>
    <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25484#M77</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1639681991"&gt;@StacyMantzaris&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Your contribution to helping create a realistic and relevant course with applicable examples is very much appreciated.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would recommend the following detailed &lt;EM&gt;"textbook case studies"&lt;/EM&gt;. These investigative reports have lots of details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The &lt;STRONG&gt;Equifax&lt;/STRONG&gt; Data Breach, U.S. House of Representatives Committee on Oversight and Government Reform&lt;BR /&gt;&lt;A href="https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf&amp;nbsp;" target="_blank" rel="noopener"&gt;https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;GAO Report to Congressional Requesters, DATA PROTECTION Actions Taken by &lt;STRONG&gt;Equifax&lt;/STRONG&gt; and Federal Agencies in Response to the 2017 Breach &lt;A href="https://www.gao.gov/assets/700/694158.pdf" target="_blank" rel="noopener"&gt;https://www.gao.gov/assets/700/694158.pdf&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;STRONG&gt;OPM&lt;/STRONG&gt; Data Breach: How the Government Jeopardized Our National Security for More than a Generation Committee on Oversight and Government Reform U.S. House of Representatives 114th Congress &lt;A href="https://ia801206.us.archive.org/15/items/ReportFromTheCommitteeOnOversightAndGovernmentReformOnTheOPMBreach/Report%20from%20the%20Committee%20on%20Oversight%20and%20Government%20Reform%20on%20the%20OPM%20Breach.pdf" target="_blank" rel="noopener"&gt;https://ia801206.us.archive.org/15/items/ReportFromTheCommitteeOnOversightAndGovernmentReformOnTheOPMBreach/Report%20from%20the%20Committee%20on%20Oversight%20and%20Government%20Reform%20on%20the%20OPM%20Breach.pdf&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;And don't forget about &lt;STRONG&gt;Sony&lt;/STRONG&gt; - that was the start of the proliferation of ransomware, which is a whole other branch of incident management that deserves its own course... Here is a John Hopkins University report. &lt;A href="https://www.jhuapl.edu/Content/documents/SonyNightmareBeforeChristmas.pdf" target="_blank" rel="noopener"&gt;https://www.jhuapl.edu/Content/documents/SonyNightmareBeforeChristmas.pdf&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Wed, 17 Jul 2019 14:30:35 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2019-07-17T14:30:35Z</dc:date>
    <item>
      <title>Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25386#M68</link>
      <description>&lt;P&gt;We are in the process of developing a new immersive training course on incident management as part of our PDI catalog of offerings and would like help identifying possible/realistic security incidents that we can incorporate in the course.&amp;nbsp; What incidents (not actual data breaches) are you aware of, were involved in or can imagine occurring?&amp;nbsp; If you can, please share your thoughts, ideas, and comments below. Need some inspiration on what to add?&amp;nbsp; Here’s some information to get you started:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;A brief description&lt;/LI&gt;
&lt;LI&gt;Roles involved (i.e. departments/teams, key positions like CISO, etc.)&lt;/LI&gt;
&lt;LI&gt;Applicable technology&lt;/LI&gt;
&lt;LI&gt;Lessons learned &amp;nbsp;&lt;/LI&gt;
&lt;LI&gt;Anything else you think will help us better understand the magnitude of the incident.&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you prefer please send me a private message and our team will contact you to learn more about the potential/actual incident.&amp;nbsp;Please note, we may also reach out via private message to get more information or discuss your comments further.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance for sharing your experiences with us.&amp;nbsp; Your contribution to helping create a realistic and relevant course with applicable examples is very much appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 12:36:57 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25386#M68</guid>
      <dc:creator>StacyMantzaris</dc:creator>
      <dc:date>2019-07-16T12:36:57Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25390#M69</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Unknown variant of Ransomware&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Organisation detects signs that appear to be the behaviour of ransomware (not possible to open files on shared storage) and oddly named file extentions appended.&amp;nbsp; Initial investigation suggests it is ransomware encrypting part of a file system.&amp;nbsp; It was CTB Locker.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;vCSIRT&lt;/STRONG&gt; (comprising Sec Manager, Support Managers and Server and Storage Engineers convened)&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note composition of vCSIRT depends on the playbook.&amp;nbsp; CISO informed.&amp;nbsp; Gov CERT duty handler informed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Technology&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Windows 2012, Citrix XenApp 6.5, 3PAR SAN, Symantec dedupe disk backup and the offending Adobe Flash Plugin!&amp;nbsp;&amp;nbsp;Note XenApp servers are rebuilt from offline images every night.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Lessons Learned&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. Have an upto date backup that will restor within your RTO/RPO.&lt;/P&gt;&lt;P&gt;2. Patch your estate continually (every week).&amp;nbsp; Patch delay time was exploited; the time between release and install, which was formerly 30 days.&lt;/P&gt;&lt;P&gt;3. Pay your incident response team and don't rely on good will alone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Magnitude&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Low; architecture meant we could delete to infected servers and selectively restore data within 6 hours.&lt;/P&gt;&lt;P&gt;Additional more frequent patching did increase costs to a small degree; again architecture meant only 1 image patched for 4K users.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 13:00:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25390#M69</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-07-16T13:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25391#M70</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1639681991"&gt;@StacyMantzaris&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;What incidents (not actual data breaches) are you aware of, were involved in or can imagine occurring?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Curious about the distinction of "not actual data breaches." In this day and age, a huge part of incident response is addressing the actual breach or the potential breach. Is it just a matter of not wanting something that may be an actual incident and carry certain legal ramifications if it were written up as a case study?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 13:03:03 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25391#M70</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2019-07-16T13:03:03Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25393#M71</link>
      <description>&lt;P&gt;If you look at it from a safety perspective the majority of security incidents aren't breaches.&amp;nbsp; So in order of severity you have a serious breach, major incident (which could of course be availability related), incident, minor incident (such as, single desktop missing upto date AV) and then the near misses from which you can learn a lot.&amp;nbsp; And finally you have the security weaknesses and poor practices which need addressing, which you'd prefer everyone report do you're aware they exist.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 13:25:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25393#M71</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-07-16T13:25:48Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25395#M72</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;If you look at it from a safety perspective the majority of security incidents aren't breaches.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I might want to qualify that as "apparent breaches," but point taken, perhaps the idea is to speak of the building block incidents that often precede something major. In some ways, however, I think it is worth taking those major incidents and showing how simple the error really was; supposedly the DNC attack was a matter of someone accidentally forgetting the "not" in front of "legitimate" advice given to John Podesta. A lot is a matter of awareness more than technical control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is a case in point:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lost/stolen Android cellphone belonging to a senior-level employee. The phone did have a passcode, however, it also had stored credentials for accessing corporate resources and an unlocked SIM card. Employee did not report it missing for three weeks. Employee did report to his provider approximately 72 hours after losing it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The company security officer (basically IT manager who wears multiple hats) served as lead. Once reported, reset credentials and attempted to monitor for untoward activity. Given the lengthy delay a third party was called in to assist with the review. An inventory of all data accessible via the device taken. However, the phone number connected with device also was used in certain two-step authentication systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The lessons learned were multiple. 1) Policy was lacking, most relevant connecting security behavior to HR and embraced by board/senior management. Simply the senior employee didn't feel compelled to deal with the issue or recognize a corporate impact to his missing cellphone 2) While there was annual security awareness training, clearly it wasn't doing its job. 3) Technical controls like mobile device management were absent so too a policy on approved devices and related employee procedures (i.e. immediate reporting). 4) The employee specifically indicated that he didn't want to deal with the "hassle" - this also speaks to a cultural issue where response teams or security officers aren't always that approachable.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 14:06:36 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25395#M72</guid>
      <dc:creator>JoePete</dc:creator>
      <dc:date>2019-07-16T14:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25401#M73</link>
      <description>&lt;P&gt;Behaviour/Culture related problems are always more difficult to handle.&amp;nbsp; It's why some HR departments become part of the problem with their disciplinarian attitude.&amp;nbsp; Punishing staff for clicking on a phishing link or having their laptop stolen doesn't foster a culture in which staff report errors or accidents.&amp;nbsp; If you make reporting near misses and incidents to be something they can do without fear of adverse personal consequences then you get earlier visibility when things have gone wrong and can act to contain the incident.&amp;nbsp; It also helps to have prepared; so encrypt your mobile devices, lock down use of removable media, install antimalware, keep your machines patched and appropriately securely configured and have measure in place to locate or remote wipe them.&amp;nbsp; It all has to be part of the overall Deming cycle.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2019 14:46:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25401#M73</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-07-16T14:46:02Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25406#M74</link>
      <description>&amp;gt; StacyMantzaris ((ISC)Â² Team) posted a new topic in Welcome on 07-16-2019 08:36&lt;BR /&gt;&lt;BR /&gt;&amp;gt; We are in the process of developing a new immersive training course on incident&lt;BR /&gt;&amp;gt; management as part of our PDI catalog of offerings and would like help&lt;BR /&gt;&amp;gt; identifying possible/realistic security incidents that we can incorporate in the&lt;BR /&gt;&amp;gt; course.&lt;BR /&gt;&lt;BR /&gt;In my incident response/management/planning seminars, I have a slide that&lt;BR /&gt;mentions "bad weather," and is illustrated with a picture of bright sunshine. I&lt;BR /&gt;explain that, when I was working on one version of the seminar I happened to&lt;BR /&gt;encounter someone talking about ice-fall climbing, and noting the danger of&lt;BR /&gt;sunshine in that situation.&lt;BR /&gt;&lt;BR /&gt;The point being that an "incident" is going to be enterprise-specific, and that you&lt;BR /&gt;don't need to address a canned list of "incidents" and leave it at that ...&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@vcn.bc.ca slade@victoria.tc.ca rslade@computercrime.org&lt;BR /&gt;I'd be content if my children grew up to think decorating&lt;BR /&gt;consists mostly of building enough bookshelves. - Anna Quindlen&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://is.gd/RotlWB" target="_blank"&gt;https://is.gd/RotlWB&lt;/A&gt;</description>
      <pubDate>Tue, 16 Jul 2019 16:04:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25406#M74</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2019-07-16T16:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25418#M75</link>
      <description>&lt;P&gt;Incidents are industry/company specific.&amp;nbsp; Depending on the size of an organization, a virus incursion on one desktop could be and is an incident in a small shop however in a large shop, it would be an annoyance.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are many things that comprise an incident and simply broken down could be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- something happens&lt;/P&gt;&lt;P&gt;- folks are pulled together&lt;/P&gt;&lt;P&gt;- a resolution is found and incident remedied.&lt;/P&gt;&lt;P&gt;- lessons learned are documented&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you might want to consider is some of the aftermath that occurs with incidents (actually during and after).&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see Self-care playing a part of this.&amp;nbsp; Folks during an incident are concerned that they may be fired or that the company will go bankrupt (I know extreme) but emotions do run high.&amp;nbsp; After the event, there is relief (sometimes) and then there is usually&amp;nbsp;"the hunt for the innocent.....that is someone to blame".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To me, a Crisis manager has to wear multiple hats, they have to weather the ire from senior managers who&amp;nbsp; ask multiple questions, they have to keep folks motivated to find a solution, they also in some ways need to be psychologist.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My two cents&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS: I have sent an incident in via private mail but for all the wrong reasons cannot discuss it publicly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 11:36:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25418#M75</guid>
      <dc:creator>dcontesti</dc:creator>
      <dc:date>2019-07-17T11:36:13Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25462#M76</link>
      <description>&lt;P&gt;And for some companies it could be a simple as founder has heart attack and is unable to work.&amp;nbsp; Company begins to unravel in their absence, incidents occur, bugs don't get fixed and services get turned off by customers contain potential breaches.&amp;nbsp; And yep, seen that happen.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2019 10:21:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25462#M76</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-07-17T10:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25484#M77</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1639681991"&gt;@StacyMantzaris&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Your contribution to helping create a realistic and relevant course with applicable examples is very much appreciated.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I would recommend the following detailed &lt;EM&gt;"textbook case studies"&lt;/EM&gt;. These investigative reports have lots of details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The &lt;STRONG&gt;Equifax&lt;/STRONG&gt; Data Breach, U.S. House of Representatives Committee on Oversight and Government Reform&lt;BR /&gt;&lt;A href="https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf&amp;nbsp;" target="_blank" rel="noopener"&gt;https://republicans-oversight.house.gov/wp-content/uploads/2018/12/Equifax-Report.pdf&amp;nbsp;&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;GAO Report to Congressional Requesters, DATA PROTECTION Actions Taken by &lt;STRONG&gt;Equifax&lt;/STRONG&gt; and Federal Agencies in Response to the 2017 Breach &lt;A href="https://www.gao.gov/assets/700/694158.pdf" target="_blank" rel="noopener"&gt;https://www.gao.gov/assets/700/694158.pdf&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;The &lt;STRONG&gt;OPM&lt;/STRONG&gt; Data Breach: How the Government Jeopardized Our National Security for More than a Generation Committee on Oversight and Government Reform U.S. House of Representatives 114th Congress &lt;A href="https://ia801206.us.archive.org/15/items/ReportFromTheCommitteeOnOversightAndGovernmentReformOnTheOPMBreach/Report%20from%20the%20Committee%20on%20Oversight%20and%20Government%20Reform%20on%20the%20OPM%20Breach.pdf" target="_blank" rel="noopener"&gt;https://ia801206.us.archive.org/15/items/ReportFromTheCommitteeOnOversightAndGovernmentReformOnTheOPMBreach/Report%20from%20the%20Committee%20on%20Oversight%20and%20Government%20Reform%20on%20the%20OPM%20Breach.pdf&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;And don't forget about &lt;STRONG&gt;Sony&lt;/STRONG&gt; - that was the start of the proliferation of ransomware, which is a whole other branch of incident management that deserves its own course... Here is a John Hopkins University report. &lt;A href="https://www.jhuapl.edu/Content/documents/SonyNightmareBeforeChristmas.pdf" target="_blank" rel="noopener"&gt;https://www.jhuapl.edu/Content/documents/SonyNightmareBeforeChristmas.pdf&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Wed, 17 Jul 2019 14:30:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25484#M77</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2019-07-17T14:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: Input Needed for New (ISC)2 PDI Course Offering on Incident Management</title>
      <link>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25521#M78</link>
      <description>&lt;P&gt;Actually if you look at the human side of potential incidents, many behaviours and belief are a large part of the problem:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I left my laptop on a table in the hotel lobby and when I came back from my meeting 2 hours later it was missing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've have left my laptop on the train, can you got to lost property at the end of the line and see if they have it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've have my laptop stolen.&amp;nbsp; Where was it at the time?&amp;nbsp; In my car.&amp;nbsp; You left you laptop on view in your car?&amp;nbsp; I left my car parked up in a public car park unlocked and the thieves took my car.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 09:32:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/CPE-Opportunities/Input-Needed-for-New-ISC-2-PDI-Course-Offering-on-Incident/m-p/25521#M78</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2019-07-18T09:32:39Z</dc:date>
    </item>
  </channel>
</rss>

