Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
Unit 42 Researchers Discover Multiple Espionage Operations Targeting Southeast Asian Government
  • Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
  • magnifying glass search icon to open search field
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • Sign In
    Sign In
    • Customer
    • Partner
    • Employee
    • Research
  • Create Account
  • EN
    Language
  • Get Started
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Research
Video

Applying Knowledge from Past Security Incidents

Sep 20, 2023

In this video, Jenna Garbett, senior incident response consultant at Unit 42®, highlights the importance of the "lessons learned" phase in the Incident Response (IR) lifecycle. She emphasizes its role in identifying necessary adjustments to an organization's security program or processes post-incident.

This phase involves a comprehensive review of the incident, assessing the effectiveness of the IR plan and processes, what worked, what didn't, and any potential areas for improvement. Understanding how the threat actor gained access and their actions within the system is crucial for hardening the organization's security approach.

Jenna discusses several key topics to evaluate during this phase, including the efficacy of the IR plan, potential lapses in response, stakeholder notification, documentation, available tools and data sources, and relationship management for IR support.

She further underscores the value of reflecting on incidents, analyzing successes and shortcomings, and engaging in dialogue with executives and key stakeholders to strengthen IR plans and enhance resilience against evolving threats. This is a must-watch video for organizations looking to learn from their past to fortify future security measures.

Share page on facebook Share page on linkedin Share page by an email
Related Resources

Access a wealth of educational materials, such as datasheets, whitepapers, critical threat reports, informative cybersecurity topics, and top research analyst reports

See all resources

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Products A-Z
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Customers
  • Careers
  • Contact Us
  • Manage Email Preferences
  • Newsroom
  • Product Certifications
Report a Vulnerability
Create an account or login

Copyright © 2023 Palo Alto Networks. All rights reserved