Cyber Security Incident First Responder Training

Helping Your Team Handle a Security Incident

The Training Skill Set

Cyber incident response training is technical and skill based, designed to enable those with first responder responsibility to address security incidents as they occur, execute critical defensive tasks and ensure the integrity of any data they encounter.

Key tenants of a first responder will be reviewed:

  • Identify the scene
  • Protect the scene
  • Preserve temporary and fragile evidence
  • Collect complete information about the incident
  • Document all findings
  • Package and transport the electronic evidence

Cyber incident response training participants will also receive a HALOCK custom-created toolkit that can be used to collect forensic data during the course of an incident.


Training Resources: Incident Response Forms

As part of our cyber security incident response training, we introduce first responders to the following incident response forms and instruct them in their use:

  • Observations and Actions Log
  • Inventory of Impacted Assets
  • Incident Classification Worksheet
  • Impact Analysis Worksheet
  • Third Parties Contacted Log
  • Chain-of-Custody Form
  • Root Cause Analysis Form
  • Internal Investigation Form
  • Status Meeting Minutes
  • Response Approach Worksheet

CSIRT training from HALOCK helps lay the foundation for more in-depth cyber incident response certification. Equipped with the right tools, skills and CSIRT training resources, employees are better equipped to manage cyber security incidents and minimize their impact. Your response to a security incident and preparation will impact your cyber insurance coverage and premiums.

CSIRT First Responder Training

What is Your Incident Management Strategy?

HALOCK overall strategic approach – Purpose Driven Security®, helps define reasonable security – the right amount of security to protect critical assets. It brings together a full perspective of an organization to establish what is reasonable and appropriate to manage risk.

  • Security controls implemented should encompass the necessary balance of compliance, business objectives, and obligations on how they affect all parties. Not all security controls should be implemented, and those that are should be implemented only to a certain degree depending on the calculated risk being treated.
  • Organizations have an obligation to perform proactive due care to reduce liability for shareholders, clients, partners, employees and the greater good as appropriate. Thus, businesses need to take into consideration on cyber security threats that are foreseeable, which HALOCK can help identify.

Contact Us