Turning Weakness into Strength: How to Learn From an IT Security Incident

Turning Weakness into Strength: How to Learn From an IT Security Incident

Randy L. Burkhead
ISBN13: 9781522505228|ISBN10: 1522505229|EISBN13: 9781522505235
DOI: 10.4018/978-1-5225-0522-8.ch006
Cite Chapter Cite Chapter

MLA

Burkhead, Randy L. "Turning Weakness into Strength: How to Learn From an IT Security Incident." Handbook of Research on Individualism and Identity in the Globalized Digital Age, edited by F. Sigmund Topor, IGI Global, 2017, pp. 118-139. https://doi.org/10.4018/978-1-5225-0522-8.ch006

APA

Burkhead, R. L. (2017). Turning Weakness into Strength: How to Learn From an IT Security Incident. In F. Topor (Ed.), Handbook of Research on Individualism and Identity in the Globalized Digital Age (pp. 118-139). IGI Global. https://doi.org/10.4018/978-1-5225-0522-8.ch006

Chicago

Burkhead, Randy L. "Turning Weakness into Strength: How to Learn From an IT Security Incident." In Handbook of Research on Individualism and Identity in the Globalized Digital Age, edited by F. Sigmund Topor, 118-139. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-0522-8.ch006

Export Reference

Mendeley
Favorite

Abstract

In today's culture organizations have come to expect that information security incidents and breaches are no longer a matter of if but when. This shifting paradigm has brought increased attention, not to the defenses in place to prevent an incident but, to how companies manage the aftermath. Using a phenomenological model, organizations can reconstruct events focused on the human aspects of security with forensic technology providing supporting information. This can be achieved by conducting an after action review for incidents using a phenomenological model. Through this approach the researcher can discover the common incident management cycle attributes and how these attributes have been applied in the organization. An interview guide and six steps are presented to accomplish this type of review. By understanding what happened, how it happened, and why it happened during incident response, organizations can turn their moment of weakness into a pillar of strength.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.