Learn the best methods of forensics team management for conducting a complete and thorough computer incident response.
Introduction and definitions
The Stages of Incident Response
Security Incident Response Team Members
Incident Evidence
Incident Response Tools
Incident Response Policy and Procedures
Legal Requirements and Considerations
Government Policy and Procedures
Forensics Process
Forensics Team Requirements
Forensics Team Policy and Procedures
Management of Forensics Evidence Handling
Forensics Tools
Legalities of Forensics
Forensics Team Oversight
Corporate Management
Relationship Management
Conclusion
Leighton Johnson is the CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT), a provider of computer security, forensics consulting & certification training. He has over 38 years experience in Computer Security, Software Development and Communications Equipment Operations & Maintenance. Primary focus areas have included computer security, information operations & assurance, software system development life cycle focused on modeling & simulation systems, systems engineering and integration activities, anti-terrorism/cyber terrorism, database administration, business process & data modeling. He just completed service as the AT/COOP task lead for a DOD Field Agency, based in Alexandria, VA. He recently was the CIO for a 450 person directorate within Lockheed Martin IS&GS covering 9 locations within the Eastern and Midwestern parts of the U.S. He previously served as Security Operations Program Manager for a US DOD Field Agency, based in Arlington, VA. He is a member of the CSA CloudSIRT working group developing the model for response collaboration among cloud providers, responders and users; the CSA Security-as-a-Service working group developing the definitions for SECaaS requirements and models, as well as a member of the IEEE Education working groups on Cloud and on Computer Software Security. He recently served as a member of the IS Alliance - NIST joint working group on VOIP SCAP security. He has taught Digital and Network Forensics courses at Georgia Regents University. He holds CISM (Certified Information Security Manager), CISA (Certified Information Systems Auditor), CISSP (Certified Information Systems Security Professional), CIFI (Certified Information Forensics Investigator), CSSLP (Certified Secure Software Lifecycle Professional), CAP (Certified Authorization Professional), CRISC (Certified in Risk & Information Systems Control), CMAS (Certified Master Antiterrorism Specialist), CAS-CTR (Certified Antiterrorism Specialist - Cyber Terrorism Response) and MBCI (Certified Member Business Continuity Institute) credentials.
"... might be useful as an overview for the lay person or
beginner…" --Security Management
"The book explores the right subjects. It provides the right
warnings, focal points, and pitfalls. It stays clearly away from
technical details, but does, for instance, present tools with
strengths and weaknesses. Unlike other books, it does look at the
situation outside of the US. In forensics, you need to prove
competence beyond doubt. For a team manager, this book is not a bad
start for building that proof." --ComputingReviews.com, July/August
2014
"Ultimately, this book is about protecting the organisation – and
not just against the hackers...Getting your response right is all
about teamwork, and this book is a helpful guide for putting
together the best team for the job." --Network Security, February
2014
Ask a Question About this Product More... |