<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Event or Incident in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38980#M2941</link>
    <description>Good example, it could be a potential adversarial event that could escalate into an incident. Or it could be someone who forgot their password.&lt;BR /&gt;&lt;BR /&gt;How about port scanning on Internet facing devices? I'd get the alert and monitor the situation but we really wouldn't escalate to an incident by itself.</description>
    <pubDate>Thu, 03 Sep 2020 22:19:15 GMT</pubDate>
    <dc:creator>tmekelburg1</dc:creator>
    <dc:date>2020-09-03T22:19:15Z</dc:date>
    <item>
      <title>Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38973#M2937</link>
      <description>&lt;P&gt;I was listening to the &lt;A title="Security Metrics&amp;nbsp;podcast: 6 Phases of an Incident Response Plan" href="https://www.securitymetrics.com/learn/6-phases-of-an-incident-response-plan" target="_blank" rel="noopener"&gt;Security Metrics&amp;nbsp;podcast: 6 Phases of an Incident Response Plan&lt;/A&gt; during my usual lunch walk. Dave was describing the 2nd phase Identification and knowing if it's an incident or an event. He described&amp;nbsp;both and gave examples of each. I pulled the definition&amp;nbsp;of those from two different sources as a comparison.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"An&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;event&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is any occurrence that can be observed, verified, and documented, whereas an&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;I&gt;incident&lt;/I&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;is one or more related &lt;STRONG&gt;events&lt;/STRONG&gt; that negatively affect the company and/or impact its security posture."&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Event&lt;/STRONG&gt; - Any occurrence that takes place during a certain period of time&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;Incident&lt;/STRONG&gt; - An event that has a negative outcome affecting the confidentiality, integrity, or availability of an organization’s data&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In regards to cyber security, has anyone ever experienced an &lt;STRONG&gt;event&lt;/STRONG&gt; that didn't turn into an &lt;STRONG&gt;incident&lt;/STRONG&gt;?&amp;nbsp;Not counting false-positive alarms from a SIEM.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 18:59:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38973#M2937</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-03T18:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38974#M2938</link>
      <description>&amp;gt; tmekelburg1 (Newcomer III) posted a new topic in Tech Talk on 09-03-2020 02:58&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; &amp;nbsp; In regards to cyber security,&lt;BR /&gt;&amp;gt; has anyone ever experienced an event that didn't turn into an incident?&lt;BR /&gt;&lt;BR /&gt;Every browser crash or device reboot is an event. Most of them don't turn into&lt;BR /&gt;incidents.&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;You can't depend on your eyes when your imagination is out of&lt;BR /&gt;focus. - Mark Twain&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Thu, 03 Sep 2020 19:31:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38974#M2938</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-09-03T19:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38976#M2939</link>
      <description>&lt;BLOCKQUOTE&gt;Every browser crash or device reboot is an event. Most of them don't turn into&lt;BR /&gt;incidents.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Of course but I'm talking cyber security related, not technical glitches.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 19:38:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38976#M2939</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-03T19:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38979#M2940</link>
      <description>For example, an externally facing web server with authentication/login workflow.&lt;BR /&gt;From the authentication log you see a failed login attempt, that's an event.&lt;BR /&gt;But since the login failed and did not cause breach, it's not incident.</description>
      <pubDate>Thu, 03 Sep 2020 21:16:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38979#M2940</guid>
      <dc:creator>sergeling</dc:creator>
      <dc:date>2020-09-03T21:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38980#M2941</link>
      <description>Good example, it could be a potential adversarial event that could escalate into an incident. Or it could be someone who forgot their password.&lt;BR /&gt;&lt;BR /&gt;How about port scanning on Internet facing devices? I'd get the alert and monitor the situation but we really wouldn't escalate to an incident by itself.</description>
      <pubDate>Thu, 03 Sep 2020 22:19:15 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/38980#M2941</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-03T22:19:15Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39011#M2942</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;Its an observation, the source, if it can be defined accurately should be logged.&amp;nbsp; Or a Use case created to identify agreed actions or notifications due to a reconnaissance, which may later turn out into something more vigorous.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 06:33:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39011#M2942</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-09-06T06:33:56Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39015#M2943</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;or notifications due to a reconnaissance, which may later turn out into something more vigorous.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Absolutely, and it could be used as a distraction technique as well. Any more examples of a cyber security event that stays an event and wouldn't escalate into an incident?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone feel it's important that people outside of the IT world understand the difference and even go so far as correcting their language when used incorrectly? It personally doesn't bother me but to some it does.&lt;/P&gt;</description>
      <pubDate>Sun, 06 Sep 2020 12:13:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39015#M2943</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-06T12:13:43Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39039#M2946</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Event&lt;/STRONG&gt; - Something that happens that gets logged.&amp;nbsp; Think of Windows &lt;STRONG&gt;Event&lt;/STRONG&gt; Viewer.&amp;nbsp; A user logs on.&amp;nbsp; A service starts.&amp;nbsp; A server is restarted.&amp;nbsp; A packet is allowed through a firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Incident&lt;/STRONG&gt; - An event that violates policy.&amp;nbsp; A user attempts to logon outside of allowed hours or from outside of an allowed location.&amp;nbsp; An IPS signature is triggered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Breach&lt;/STRONG&gt; - Information is lost of disclosed.&amp;nbsp; CIA is compromised.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 18:26:42 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39039#M2946</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-09-07T18:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39041#M2947</link>
      <description>Thanks for replying chogan!&lt;BR /&gt;&lt;BR /&gt;What about a phishing email? Would the email delivered to the user's inbox be the event and it wouldn't escalate to an incident until the payload was activated? Or would you consider it an incident at the onset?</description>
      <pubDate>Mon, 07 Sep 2020 21:13:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39041#M2947</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-07T21:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39048#M2948</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;What about a phishing email? Would the email delivered to the user's inbox be the event and it wouldn't escalate to an incident until the payload was activated? Or would you consider it an incident at the onset?&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Ask yourself if you have a policy that prohibits receipt of a phishing email.&amp;nbsp; If you do, then it would be an Incident.&amp;nbsp; Otherwise, it would be an event.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you actively filter bad emails with an "advanced threat protection" system, then bad things getting past it would be an incident.&amp;nbsp; However, if you depend upon your users to do the correct thing then it would only become an incident if the user reacts incorrectly.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 13:01:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39048#M2948</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-09-08T13:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39049#M2949</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/311867713"&gt;@denbesten&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;BLOCKQUOTE&gt;Ask yourself if you have a policy that prohibits receipt of a phishing email.&amp;nbsp;&amp;nbsp;&lt;/BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;As soon as I get one drafted, I'll send it to the threat actors for their signature and acknowledgment! I'm kidding, I know what you mean lol.&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;If you actively filter bad emails with an "advanced threat protection" system, then bad things getting past it would be an incident.&amp;nbsp; However, if you depend upon your users to do the correct thing then it would only become an incident if the user reacts incorrectly.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;In our case, we filter email and depend on our users to apply their security awareness training skills. Some phishing emails still get through. This could be one of those grey areas where the view point of an incident or event would change between organizations.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 14:15:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39049#M2949</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-08T14:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39125#M2951</link>
      <description>&lt;P&gt;When I look as the message log on my email gateway, I see a list of emails.&amp;nbsp; Some were allowed, some were blocked.&amp;nbsp; I consider all of those to be events.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We instruct users to report any malicious emails they receive.&amp;nbsp; These I create incidents for, so that we can investigate how they made it through our filters and see if there is any action we can take to prevent them in the future.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 23:48:41 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/39125#M2951</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-09-09T23:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/62829#M4071</link>
      <description>&lt;P&gt;Before I studied for my CISSP, I did not realize that availability is one of the principles of InfoSec. An application crashing or a reboot are events that affect availability so they are InfoSec/cybersecurity events. C and I get most of the focus (the OSG mentions something to that effect, and it generally is true) but don't forget the A.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Incidents may or may not be serious and thus may or may not need to be reported to senior mgmt, regulatory authorities, law enforcement, etc. For example, you have a public web server that was port scanned by an IP address from X country. Is it an incident? Yes. Does it need to be reported, probably not since your public web server is by design exposed to the internet. If the attacker actually breached the network by exploiting a vulnerability on the web server, that should be considered a major and reportable incident.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About incidents, NIST has a few definitions with some minute differences which don't line up exactly with the CISSP OSG definition. A few here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/glossary/term/computer_security_incident" target="_blank"&gt;https://csrc.nist.gov/glossary/term/computer_security_incident&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/glossary/term/cybersecurity_incident" target="_blank"&gt;https://csrc.nist.gov/glossary/term/cybersecurity_incident&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://csrc.nist.gov/glossary/term/incident" target="_blank"&gt;https://csrc.nist.gov/glossary/term/incident&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Sep 2023 20:42:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/62829#M4071</guid>
      <dc:creator>MartinN</dc:creator>
      <dc:date>2023-09-15T20:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Event or Incident</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/63137#M4074</link>
      <description>&lt;P&gt;Event comes first before the incident.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;some events are not incident, for example an authorized user that forgot his password.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tried to log so many times but failed and got blocked.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 06:44:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Event-or-Incident/m-p/63137#M4074</guid>
      <dc:creator>GemDales</dc:creator>
      <dc:date>2023-09-27T06:44:51Z</dc:date>
    </item>
  </channel>
</rss>

