This curriculum spans the equivalent of a multi-workshop incident response program, covering detection through post-incident improvement with the technical and procedural specificity seen in enterprise security operations and cross-functional crisis management.
Module 1: Incident Detection and Triage
- Configure SIEM correlation rules to distinguish between false positives and genuine threats based on historical alert volume and attacker behavior patterns.
- Integrate endpoint detection and response (EDR) telemetry with network-based IDS to validate lateral movement indicators during initial triage.
- Establish escalation thresholds for incident classification based on data sensitivity, system criticality, and potential business impact.
- Implement automated enrichment of alerts using threat intelligence feeds while managing API rate limits and data relevance.
- Design triage workflows that assign ownership based on asset ownership matrices and on-call rotation schedules.
- Balance speed of response with forensic integrity by determining when to isolate systems versus preserving volatile evidence.
Module 2: Cross-Functional Incident Coordination
- Define communication protocols for bridging IT, legal, PR, and executive stakeholders during active incidents without compromising operational security.
- Assign decision rights for system isolation, data disclosure, and external notifications using a RACI matrix tailored to incident severity levels.
- Conduct tabletop simulations with non-technical departments to align on messaging, escalation paths, and downtime expectations.
- Manage jurisdictional conflicts when incidents span geographies with differing data protection regulations.
- Document incident timelines in a shared, access-controlled platform with version control to prevent conflicting narratives.
- Coordinate handoffs between first responders and forensic analysts to maintain chain of custody and avoid evidence contamination.
Module 3: Containment and System Isolation
- Implement network segmentation strategies that allow surgical isolation of compromised subnets without disrupting critical business operations.
- Decide between full host shutdown and network-level blocking based on malware persistence mechanisms and monitoring capabilities.
- Configure firewall rules to block command-and-control traffic while preserving outbound DNS for forensic analysis.
- Use jump boxes with restricted credentials to access quarantined systems for data collection.
- Balance containment speed with business continuity by pre-defining acceptable downtime thresholds for key services.
- Document isolation actions in real time to support post-incident audits and regulatory reporting.
Module 4: Forensic Data Collection and Preservation
- Select forensic imaging tools based on disk encryption status, system availability, and legal admissibility requirements.
- Establish secure transfer protocols for moving memory dumps and logs from compromised systems to analysis environments.
- Preserve volatile data from active directories and cloud workloads before initiating containment procedures.
- Validate forensic tool integrity using cryptographic checksums prior to deployment in live environments.
- Manage storage capacity and retention policies for forensic artifacts in accordance with incident severity and investigation timelines.
- Coordinate with legal counsel on data handling procedures when evidence involves personally identifiable information (PII).
Module 5: Threat Actor Analysis and Attribution
- Map observed tactics, techniques, and procedures (TTPs) to MITRE ATT&CK framework to identify likely adversary groups.
- Correlate malware artifacts with public and private threat intelligence to assess origin and intent.
- Decide whether to pursue attribution based on incident impact, available resources, and organizational disclosure policies.
- Use sandboxing environments to analyze malicious payloads without exposing production systems.
- Document indicators of compromise (IOCs) in STIX/TAXII format for internal reuse and potential sharing with ISACs.
- Assess the reliability of third-party attribution claims by evaluating their data sources and analytical methodology.
Module 6: Eradication and Remediation Planning
- Develop rebuild vs. clean-up criteria based on root cause, system role, and confidence in complete threat removal.
- Coordinate patch deployment across interdependent systems while managing change control windows and rollback procedures.
- Validate credential rotation across on-premises and cloud environments to eliminate attacker access paths.
- Reconfigure misused service accounts with principle of least privilege after identifying abuse during the incident.
- Update firewall and EDR policies to block identified attack vectors before restoring affected systems.
- Document remediation steps in runbooks to ensure consistency across multiple affected assets.
Module 7: Post-Incident Review and Process Improvement
- Conduct blameless retrospectives to identify systemic gaps in detection, response, and communication workflows.
- Measure mean time to detect (MTTD) and mean time to respond (MTTR) across incidents to prioritize tooling investments.
- Update incident playbooks based on lessons learned, ensuring changes are version-controlled and distributed to response teams.
- Adjust monitoring coverage to address blind spots revealed during the incident, such as unlogged cloud services.
- Revise role-based training programs to address skill gaps observed during the response effort.
- Report control deficiencies to risk and compliance teams for inclusion in enterprise risk registers and audit plans.
Module 8: Continuous Readiness and Simulation
- Design red team scenarios that emulate adversary TTPs relevant to the organization’s threat landscape.
- Schedule unannounced drills to evaluate response team availability, communication, and decision-making under pressure.
- Rotate incident commander roles during simulations to build bench strength and reduce single points of failure.
- Measure detection coverage by validating that all critical assets are included in monitoring and alerting scopes.
- Integrate automated breach simulation tools to continuously test endpoint and email protections.
- Update response playbooks quarterly based on changes in infrastructure, threat intelligence, and regulatory requirements.