A Repeatable Collaboration Process for Incident Response Planning

A Repeatable Collaboration Process for Incident Response Planning

Alanah Davis, Gert-Jan de Vreede, Leah R. Pietron
ISBN13: 9781605663265|ISBN10: 1605663263|ISBN13 Softcover: 9781616924973|EISBN13: 9781605663272
DOI: 10.4018/978-1-60566-326-5.ch012
Cite Chapter Cite Chapter

MLA

Davis, Alanah, et al. "A Repeatable Collaboration Process for Incident Response Planning." Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp, IGI Global, 2009, pp. 250-264. https://doi.org/10.4018/978-1-60566-326-5.ch012

APA

Davis, A., de Vreede, G., & Pietron, L. R. (2009). A Repeatable Collaboration Process for Incident Response Planning. In K. Knapp (Ed.), Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions (pp. 250-264). IGI Global. https://doi.org/10.4018/978-1-60566-326-5.ch012

Chicago

Davis, Alanah, Gert-Jan de Vreede, and Leah R. Pietron. "A Repeatable Collaboration Process for Incident Response Planning." In Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, edited by Kenneth J. Knapp, 250-264. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-326-5.ch012

Export Reference

Mendeley
Favorite

Abstract

This chapter presents a repeatable collaboration process as an approach for developing a comprehensive Incident Response Plan for an organization or team. Despite the process of incident response planning being an essential ingredient in security planning procedures in organizations, extensive literature reviews have not yielded any collaborative processes for such a crucial activity. As such, this chapter will discuss the background of incident response planning as well as Collaboration Engineering, which is an approach to design repeatable collaborative work practices. We then present a collaboration process for incident response planning that was designed using Collaboration Engineering principles, followed by a discussion of the application process in three cases. The presented process is applicable across organizations in various sectors and domains, and consist of codified “best facilitation practices” that can be easily transferred to and adopted by security managers. The chapter describes the process in detail and highlights research results obtained during initial applications of the process.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.