摘要 |
Pertaining to information security services, embodiments consistent with the present invention comprise an outsourced bundle of services for the purpose of responding to a compromise of information asset(s). Many of these services and processes have never before been combined into one integrated bundle, and these novel combinations represent an improvement in efficiency and comprehensiveness over the state of the art. Methods and systems consistent with the present invention comprise several main steps and processes, some of which are optional or discretionary. These main steps are: receiving a request, obtaining preliminary information about the compromise, dispatching one or more teams to respond, creating and updating a case file, advising the customer with response decisions, notifying relevant parties about the compromise, acquiring forensics data, referring an insurance professional, implementing a training program, isolating the compromised information asset(s), neutralizing the compromise, creating a risk assessment report, implementing security technologies, and implementing security processes.
|