Investors Hangout Stock Message Boards Logo
  • Mailbox
  • Favorites
  • Boards
    • The Hangout
    • NASDAQ
    • NYSE
    • OTC Markets
    • All Boards
  • Whats Hot!
    • Recent Activity
    • Most Viewed Boards
    • Most Viewed Posts
    • Most Posted
    • Most Followed
    • Top Boards
    • Newest Boards
    • Newest Members
  • Blog
    • Recent Blog Posts
    • Recently Updated
    • News
    • Stocks
    • Crypto
    • Investing
    • Business
    • Markets
    • Economy
    • Real Estate
    • Personal Finance
  • Market Movers
  • Interactive Charts
  • Login - Join Now FREE!
  1. Home ›
  2. Stock Message Boards ›
  3. User Boards ›
  4. News Desk 2018 Message Board

7 Steps to Cyberattack Containment and Eradication

Message Board Public Reply | Private Reply | Keep | Replies (0)                   Post New Msg
Edit Msg () | Previous | Next


Post# of 617763
Posted On: 01/12/2016 10:45:02 AM
Avatar
Posted By: News Desk 2018
7 Steps to Cyberattack Containment and Eradication

SAN ANTONIO, TX --(Marketwired - January 12, 2016) - With three decades of military and civilian cyber defense under his belt, Brian Kelly, Rackspace's Chief Security Officer, was asked to contribute to the new anthology,  Navigating the Digital Age: the Definitive Cybersecurity Guide for Directors and Officers ,  developed in collaboration with the New York Stock Exchange Group and Palo Alto Networks.

It's definitely worth picking up, but if you're looking for a quick primer on how to contain and eradicate future breaches, Kelly recently penned a blog post  with an overview of the steps every business should take when faced with an attack.

For example, he writes, " Establish unity of command:  Crises have a way of bringing people out of the woodwork to get involved. But time is of the essence during a cyberattack, and an influx of untrained hands or a fight for control can make things significantly worse. Combat this possibility by building an incident plan and rehearsing it yearly."

Another tip: " Focus on outcomes:  Your first inclination may be to take a checklist approach to incident response. But since no two cyberattacks are the same, a checklist isn't the most effective approach. Instead, utilize the O-O-D-A loop: Observe, Orient, Decide, Act." 

Check out Brian Kelly's "7 Steps to Cyberattack Containment and Eradication" today.

Media Contact: Christina Weaver 210-312-4593 christina.weaver@rackspace.com



(0)
(0)








Investors Hangout

Home

Mailbox

Message Boards

Favorites

Whats Hot

Blog

Settings

Privacy Policy

Terms and Conditions

Disclaimer

Contact Us

Whats Hot

Recent Activity

Most Viewed Boards

Most Viewed Posts

Most Posted Boards

Most Followed

Top Boards

Newest Boards

Newest Members

Investors Hangout Message Boards

Welcome To Investors Hangout

Stock Message Boards

American Stock Exchange (AMEX)

NASDAQ Stock Exchange (NASDAQ)

New York Stock Exchange (NYSE)

Penny Stocks - (OTC)

User Boards

The Hangout

Private

Global Markets

Australian Securities Exchange (ASX)

Euronext Amsterdam (AMS)

Euronext Brussels (BRU)

Euronext Lisbon (LIS)

Euronext Paris (PAR)

Foreign Exchange (FOREX)

Hong Kong Stock Exchange (HKEX)

London Stock Exchange (LSE)

Milan Stock Exchange (MLSE)

New Zealand Exchange (NZX)

Singapore Stock Exchange (SGX)

Toronto Stock Exchange (TSX)

Contact Investors Hangout

Email Us

Follow Investors Hangout

Twitter

YouTube

Facebook

Market Data powered by QuoteMedia. Copyright © 2025. Data delayed 15 minutes unless otherwise indicated (view delay times for all exchanges).
Analyst Ratings & Earnings by Zacks. RT=Real-Time, EOD=End of Day, PD=Previous Day. Terms of Use.

© 2025 Copyright Investors Hangout, LLC All Rights Reserved.

Privacy Policy |Do Not Sell My Information | Terms & Conditions | Disclaimer | Help | Contact Us