{"id":81626,"date":"2024-03-07T04:20:09","date_gmt":"2024-03-07T04:20:09","guid":{"rendered":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?p=81626"},"modified":"2026-02-26T08:15:56","modified_gmt":"2026-02-26T08:15:56","slug":"what-is-incident-response","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/","title":{"rendered":"What is Incident Response"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"81626\" class=\"elementor elementor-81626\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-98b419c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"98b419c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f2f7fa4\" data-id=\"f2f7fa4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dfaa223 elementor-widget elementor-widget-text-editor\" data-id=\"dfaa223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Incident response is a structured approach to handle various types of security incidents, cyber threats, and data breaches. The incident response methodology aims to identify, contain, and minimize the cost of a cyberattack or a live incident. A well-built incident response (IR) plan can fix a potential vulnerability to prevent future attacks, but it is not the sum game.Response is a part of Incident Handling which in turn looks at the logistics, communications, synchronicity, and planning required to resolve an incident. This type of work is generally done by the Computer Security Incident Response Team (CSIRT) with the help of the <a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\">Security Operation Center.<\/a> While the core of CSIRT is incident management, its role also includes reporting, analysis, and response. However, prior to these stages, it is important that the incident is identified and reported on time. It is during this stage that the role of a SOC Analyst becomes important. All of this is best taught in <a href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\" rel=\"noopener\">EC-Council\u2019s Incident Handling Program<\/a> \u2013 a course made by some of the best industry practitioners.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e57b9a1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e57b9a1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-95383f5\" data-id=\"95383f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50ca6a4 elementor-widget elementor-widget-heading\" data-id=\"50ca6a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u201cWith a successful incident response program, damage can be mitigated or avoided altogether.\u201d<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-743e6b6 elementor-widget elementor-widget-text-editor\" data-id=\"743e6b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chris Morales, Head of Security Analytics, Vectra<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-482324d elementor-widget elementor-widget-heading\" data-id=\"482324d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why Is Incident Response Important?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f63c779 elementor-widget elementor-widget-text-editor\" data-id=\"f63c779\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tData breaches cost companies\u2019 operational downtime, reputational, and financial loss. The longer any vulnerability stays in a system, the more lethal it becomes. For most of the organizations, breaches lead to devaluation of stock value and loss of customer trust. To eliminate such risks, companies need a well-planned cybersecurity incident response plan, which aims at \u2013\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d3724cd elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d3724cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Restoring daily business operations<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Minimizing financial and reputational losses<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fixing cyber vulnerabilities comprehensively and quickly<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Strengthening security posture to avoid future attacks<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b772e5 elementor-widget elementor-widget-video\" data-id=\"6b772e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=NIKIJodcxOk&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ca79d6 elementor-widget elementor-widget-text-editor\" data-id=\"1ca79d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAnother important objective is to align the security posture with applicable regulatory standards. Organizations should comply with these standards to avoid hefty fines and penalties. A few of the significant acts and regulations are listed below \u2013\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b9a3685 elementor-widget elementor-widget-heading\" data-id=\"b9a3685\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">HIPAA (for the healthcare industry)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdd040d elementor-widget elementor-widget-text-editor\" data-id=\"cdd040d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Health Insurance Probability and Accountability Act (HIPAA) is designed to safeguard Protected Health Information (PHI) stored in an electronic form. Being HIPAA compliant, the healthcare institutions follow the HIPAA Security Rule and ensure to implement administrative, technical, and physical safeguards, thus, protect sensitive personal and health information.<\/p>\n<p><strong>To learn more:<\/strong> HIPAA: All That You Should Know<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e7f5a12 elementor-widget elementor-widget-heading\" data-id=\"e7f5a12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">PCI DSS (for payment industry)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9115a37 elementor-widget elementor-widget-text-editor\" data-id=\"9115a37\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Payment Card Industry Data Security Standard (PCI DSS) is a security standard with the primary objective of protecting credit and debit card transactions against data theft and fraud. Even though PCI DSS compliance is not mandatory, businesses should follow their guidelines to secure their credit and debit card transactions. Being PCI DSS compliant helps in building trust relationships with stakeholders and customers.<\/p><p><strong>To learn more:<\/strong> A Introduction to PCI DSS<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6451a82 elementor-widget elementor-widget-heading\" data-id=\"6451a82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Gramm-Leach-Bliley Act (for the financial services industry)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c32db86 elementor-widget elementor-widget-text-editor\" data-id=\"c32db86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Gramm\u2013Leach\u2013Bliley Act (GLBA) is an act that helps in improving competition in the industry. Its main aim is to ensure security and confidentiality of customer data, safeguard integrity by protection against potential cyber threats and unauthorized access, and proper disposal of customer data.<\/p><p><strong>To learn more:<\/strong> All About Gramm- Leach-Bliley Act<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b0e1db elementor-widget elementor-widget-heading\" data-id=\"7b0e1db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">FISMA (for federal agencies)<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-12801b5 elementor-widget elementor-widget-text-editor\" data-id=\"12801b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The Federal Information Security Management Act (FISMA) is a comprehensive framework applicable to US-based federal agencies. The act protects government information, operations, and information assets against natural disasters and cyberattacks.<\/p><p><strong>To learn more:<\/strong> Federal Information Security Management Act of 2002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f182d31 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"f182d31\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Build Your Skills in Incident Handling<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7062c63 elementor-widget elementor-widget-heading\" data-id=\"7062c63\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the common types of incidents?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cabf781 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cabf781\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-9c6a8cc\" data-id=\"9c6a8cc\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b52a27c elementor-widget elementor-widget-image\" data-id=\"b52a27c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/phishing-1.png\" class=\"attachment-full size-full wp-image-81634\" alt=\"Phishing attacks\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6800a88 elementor-widget elementor-widget-heading\" data-id=\"6800a88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Phishing attacks<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c83690 elementor-widget elementor-widget-text-editor\" data-id=\"5c83690\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t350% rise in phishing websites at the start of 2020 \u2013 United Nations\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4fc9dcf\" data-id=\"4fc9dcf\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-649458e elementor-widget elementor-widget-image\" data-id=\"649458e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/ddos-1.png\" class=\"attachment-full size-full wp-image-81635\" alt=\"Denial-of-Service attacks\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cead28 elementor-widget elementor-widget-heading\" data-id=\"6cead28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Denial-of-Service attacks<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51ba22b elementor-widget elementor-widget-text-editor\" data-id=\"51ba22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t595% year-over-year increase in DDoS attacks against utilities worldwide \u2013 NETSCOUT\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a293253\" data-id=\"a293253\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e5771d elementor-widget elementor-widget-image\" data-id=\"1e5771d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/hacked-1-1.png\" class=\"attachment-full size-full wp-image-81636\" alt=\"Ransomware attacks\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d6b480d elementor-widget elementor-widget-heading\" data-id=\"d6b480d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Ransomware attacks<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0b0927 elementor-widget elementor-widget-text-editor\" data-id=\"f0b0927\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t20% hike in ransomware attacks within 6-months, amounting to 121.4 million events \u2013 SonicWall\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1fd17d5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1fd17d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-c345263\" data-id=\"c345263\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-345385d elementor-widget elementor-widget-image\" data-id=\"345385d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/server-2-1.png\" class=\"attachment-full size-full wp-image-81637\" alt=\"SQL injections\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40b61f6 elementor-widget elementor-widget-heading\" data-id=\"40b61f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">SQL injections<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89ee23f elementor-widget elementor-widget-text-editor\" data-id=\"89ee23f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t8000% rise in SQL Injection attacks in 2019, versus 2018 \u2013 WatchGuard\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8fa75e8\" data-id=\"8fa75e8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19584c3 elementor-widget elementor-widget-image\" data-id=\"19584c3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"60\" height=\"60\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/cyber-attack-1-1.png\" class=\"attachment-full size-full wp-image-81638\" alt=\"Malware attacks\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-98ec961 elementor-widget elementor-widget-heading\" data-id=\"98ec961\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Malware attacks<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d77421 elementor-widget elementor-widget-text-editor\" data-id=\"8d77421\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t176% increase in new malware attacks disguised as Microsoft Office file types \u2013 SonicWall\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-ab211b7\" data-id=\"ab211b7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e92b689 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e92b689\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cb67ef5\" data-id=\"cb67ef5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4cdfead elementor-widget elementor-widget-heading\" data-id=\"4cdfead\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Handling Vs. Incident Management Vs. Incident Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-81b4809 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"81b4809\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-f4e0601\" data-id=\"f4e0601\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1c6d18 elementor-widget elementor-widget-heading\" data-id=\"b1c6d18\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">INCIDENT RESPONSE<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-980831b elementor-widget elementor-widget-text-editor\" data-id=\"980831b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is a set of technical activities done in order to analyze, detect, defend against, and respond to an incident. It is a part of the incident handling and incident management process. It is often used in synchrony with the term incident handling.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-8931274\" data-id=\"8931274\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ba0dad elementor-widget elementor-widget-heading\" data-id=\"7ba0dad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">INCIDENT RESPONSE<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3a8f80 elementor-widget elementor-widget-text-editor\" data-id=\"f3a8f80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is a set of technical activities done in order to analyze, detect, defend against, and respond to an incident. It is a part of the incident handling and incident management process. It is often used in synchrony with the term incident handling.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-a4873a5\" data-id=\"a4873a5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8c4417b elementor-widget elementor-widget-heading\" data-id=\"8c4417b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">INCIDENT RESPONSE<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5f6af2e elementor-widget elementor-widget-text-editor\" data-id=\"5f6af2e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is a set of technical activities done in order to analyze, detect, defend against, and respond to an incident. It is a part of the incident handling and incident management process. It is often used in synchrony with the term incident handling.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a27bbcb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a27bbcb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cef717c\" data-id=\"cef717c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f009a8 elementor-widget elementor-widget-heading\" data-id=\"2f009a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Incident Management and Business Continuity<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d44b33 elementor-widget elementor-widget-text-editor\" data-id=\"7d44b33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOne of the biggest challenges of incident management is the unpredictability of an ongoing security incident and communication gaps. Building a quick, effective, transparent, and real-time incident response plan helps minimize the downtime and impacts of the cyberattack. It also allows implementing a thorough Business Continuity Plan. To simply put, an incident response plan (IRP) and a business continuity plan (BCP) goes hand-in-hand.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c24abf2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c24abf2\" data-element_type=\"section\" data-e-type=\"section\" id=\"plan\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-d5989ed\" data-id=\"d5989ed\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aa34017 elementor-widget elementor-widget-heading\" data-id=\"aa34017\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What is an Incident Response Plan?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1223d2d elementor-widget elementor-widget-text-editor\" data-id=\"1223d2d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAn incident response plan (IRP) is a documented set of instructions that help incident responders to detect and respond to security incidents. The plan also ensures the successful recovery of the affected system. An IRP is a well-strategized plan against security breaches, data loss, and service outages.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c0c47c elementor-widget elementor-widget-heading\" data-id=\"5c0c47c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Why should you have an Incident Response Plan?<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-327cc4f elementor-widget elementor-widget-text-editor\" data-id=\"327cc4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tNo organizational system or network is safe from cyberattacks. In such an environment, an incident response plan helps mitigate the security risks and fight against crippling cybercrimes.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-afa93e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"afa93e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Get Trained in Incident Handling<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ef26d30 elementor-widget elementor-widget-heading\" data-id=\"ef26d30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What should an incident response plan include?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-323da9d elementor-widget elementor-widget-text-editor\" data-id=\"323da9d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAn incident that activates an IR plan also initiates the BCP for continuous business operations. Both incident handlers and BCP team leaders need timely and accurate information to take proper steps against the unanticipated event. The following elements of incident management systems help in offering effective business continuity \u2013\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-18e5818 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"18e5818\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fd1607a\" data-id=\"fd1607a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16b9a3e elementor-widget elementor-widget-heading\" data-id=\"16b9a3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Initial Response Statistics<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bbcfeea elementor-widget elementor-widget-text-editor\" data-id=\"bbcfeea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tFor initial response statistics, employees need important information in a real-time environment. This data helps incident responders to take resolutions against escalating situations swiftly. Being capable of establishing an intuitive, customizable system is important for incident management.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c4153ad\" data-id=\"c4153ad\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d668395 elementor-widget elementor-widget-heading\" data-id=\"d668395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Reporting<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6bbf5cf elementor-widget elementor-widget-text-editor\" data-id=\"6bbf5cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIncident managers can take proper actions against a computer security incident only if they have accurately reported information. This process needs real-time details of the incident to customize a proper response.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-aa5d802\" data-id=\"aa5d802\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a877a0d elementor-widget elementor-widget-heading\" data-id=\"a877a0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Feedback<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5db302b elementor-widget elementor-widget-text-editor\" data-id=\"5db302b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAfter the resolution of the incident, honest feedback from the stakeholders can improve the existing incident management system.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-659ca12 elementor-widget elementor-widget-heading\" data-id=\"659ca12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">To know more about the incident response in a distributed workforce using cloud forensics, check out this amazing video by Michael Weeks, Lead Incident Response Engineer at FICO.<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a727153 elementor-widget elementor-widget-text-editor\" data-id=\"a727153\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<iframe width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/3qJQTNrptek?si=39L1Nf9dp1H01C5t\" title=\"YouTube video player\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ff00fe7 elementor-widget elementor-widget-heading\" data-id=\"ff00fe7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an Incident Response Process?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fccc034 elementor-widget elementor-widget-text-editor\" data-id=\"fccc034\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>An incident response process helps an organization to remain in business. It is an accumulation of various procedures targeted at identifying, analyzing, and responding to potential security incidents. The primary objective of the process is to minimize the impact and offer rapid recovery.<\/p><p>In simple words, incident response methodology handles security incidents, breaches, and possible cyber threats. It comes with an incident response plan designed to identify the cyber-attack, minimize its impact, and reduce the financial burden.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70bbaf3 elementor-widget elementor-widget-video\" data-id=\"70bbaf3\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=WpGWSAPZqrA&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a781694 elementor-widget elementor-widget-heading\" data-id=\"a781694\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How is Incident Response Process (OODA Loop) Different from NIST Incident Response Life Cycle?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08d6d8a elementor-widget elementor-widget-text-editor\" data-id=\"08d6d8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOODA loop was developed by the US Air Force military strategist John Boyd. OODA stands for Observe, Orient, Decide, and Act. It is used to tackle incident handling in a real-time environment.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e66264 elementor-widget elementor-widget-image\" data-id=\"8e66264\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"949\" height=\"420\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Group-9158-1.png\" class=\"attachment-full size-full wp-image-81639\" alt=\"Incident Response Process (OODA Loop)\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Group-9158-1.png 949w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Group-9158-1-300x133.png 300w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Group-9158-1-768x340.png 768w\" sizes=\"(max-width: 949px) 100vw, 949px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fc018ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fc018ab\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d2fcbb2\" data-id=\"d2fcbb2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d77cf7f elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d77cf7f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-db266bb\" data-id=\"db266bb\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e5af6e elementor-widget elementor-widget-text-editor\" data-id=\"7e5af6e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCYCLE\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-b08e262\" data-id=\"b08e262\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ea45544 elementor-widget elementor-widget-text-editor\" data-id=\"ea45544\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDESCRIPTION\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-364db0d\" data-id=\"364db0d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b04696d elementor-widget elementor-widget-text-editor\" data-id=\"b04696d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTOOLS AND TACTICS\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ab098e5\" data-id=\"ab098e5\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a8f100 elementor-widget elementor-widget-text-editor\" data-id=\"1a8f100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tKEY TAKEAWAYS\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4805adf elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4805adf\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1669e68\" data-id=\"1669e68\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9fed938 elementor-widget elementor-widget-text-editor\" data-id=\"9fed938\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOBSERVE\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-50c43db\" data-id=\"50c43db\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2d8859c elementor-widget elementor-widget-text-editor\" data-id=\"2d8859c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tContinuous security monitoring helps in identifying abnormal network\/system behavior\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-c90ffb6\" data-id=\"c90ffb6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52c9296 elementor-widget elementor-widget-text-editor\" data-id=\"52c9296\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLog analysis, SIEM and IDS alerts, network monitoring, vulnerability analysis, service\/application performance monitoring\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-89601e2\" data-id=\"89601e2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b1f64ed elementor-widget elementor-widget-text-editor\" data-id=\"b1f64ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tObserve as much as you can, and document all the findings related to the security system, network, and business operations. This phase helps in successfully responding and defending the incident.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-950f755 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"950f755\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-820a9f4\" data-id=\"820a9f4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0677102 elementor-widget elementor-widget-text-editor\" data-id=\"0677102\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tORIENT\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a7ac7c4\" data-id=\"a7ac7c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-538d1be elementor-widget elementor-widget-text-editor\" data-id=\"538d1be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEvaluation of the cyber threat landscape of the organization. Logically connect and bring out real-time context to prioritize security incidents.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5caf015\" data-id=\"5caf015\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28ac0a4 elementor-widget elementor-widget-text-editor\" data-id=\"28ac0a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIncident triage, threat intelligence, awareness regarding the current situation, security research\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-29233eb\" data-id=\"29233eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9b78d8 elementor-widget elementor-widget-text-editor\" data-id=\"d9b78d8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThink like the cybercriminal to build thorough defense strategies. Take the help of threat intel to capture the right information.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-82adeeb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82adeeb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-9ca7ff8\" data-id=\"9ca7ff8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b3c8ab5 elementor-widget elementor-widget-text-editor\" data-id=\"b3c8ab5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDECIDE\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-e717819\" data-id=\"e717819\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6f02607 elementor-widget elementor-widget-text-editor\" data-id=\"6f02607\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBased on observations and context, decide an action plan that offers minimal downtime and fastest system recovery\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a58db65\" data-id=\"a58db65\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ebd0a64 elementor-widget elementor-widget-text-editor\" data-id=\"ebd0a64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOrganization\u2019s own corporate security policy\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-4641e61\" data-id=\"4641e61\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4614cb elementor-widget elementor-widget-text-editor\" data-id=\"f4614cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDocument different aspects of the process\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-fb80f29 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fb80f29\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-90d6473\" data-id=\"90d6473\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a4573f9 elementor-widget elementor-widget-text-editor\" data-id=\"a4573f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tACT\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-26d5362\" data-id=\"26d5362\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-761539e elementor-widget elementor-widget-text-editor\" data-id=\"761539e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tRemediation, recovery, and documenting lessons learned for future use\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-ef7b497\" data-id=\"ef7b497\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-baf00c4 elementor-widget elementor-widget-text-editor\" data-id=\"baf00c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tForensic analysis tools, system backup, data recovery tools, security awareness training tools and programs, patch management\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-5913841\" data-id=\"5913841\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-83f17cc elementor-widget elementor-widget-text-editor\" data-id=\"83f17cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tImprove the training methods and communication to eliminate the incident effectively\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4feabf5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4feabf5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-61ba2ce\" data-id=\"61ba2ce\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3695203 elementor-widget elementor-widget-text-editor\" data-id=\"3695203\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe NIST cybersecurity framework helps the private sector organizations of the United States to improve their prevent, detect, and response processes against cyberattacks. The framework offers high-level outcomes to assess and manage security incidents. The US National Institute of Standards and Technology released the first version of the NIST framework in 2014; it has continuously evolved since then. Its recent version includes guidance on conducting self-assessments, interacting with supply chain stakeholders, and developing a vulnerability disclosure process.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8325a2a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8325a2a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Level Up Your Cybersecurity Career With ECIH<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ba27c1d elementor-widget elementor-widget-heading\" data-id=\"ba27c1d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the phases of the incident response lifecycle defined by NIST?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c2133a9 elementor-widget elementor-widget-text-editor\" data-id=\"c2133a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe NIST framework is organized into five major functions\/phases \u2013 Identify, Protect, Detect, Respond, and Recover, which are later subdivided into 23 categories.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1deb00c elementor-widget elementor-widget-heading\" data-id=\"1deb00c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Take a look at the five phases of incident response:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e385447 elementor-widget elementor-widget-html\" data-id=\"e385447\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/staging-deveccouncil.kinsta.cloud\/cybersecurity-exchange\/wp-content\/uploads\/2023\/10\/fivephases.svg\" alt=\"Five Phases of Incident Response\">\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9372a6 elementor-widget elementor-widget-text-editor\" data-id=\"c9372a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<strong>To learn more: <span style=\"color: #428bca;\">5 Steps to Building an Incident Response Plan for a Large Organization<\/span><\/strong>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9665017 elementor-widget elementor-widget-heading\" data-id=\"9665017\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"five-steps\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What are the five steps of an incident response plan?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ebea98 elementor-widget elementor-widget-heading\" data-id=\"9ebea98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">What are the five steps of an incident response plan?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-474e829 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"474e829\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3155a9d\" data-id=\"3155a9d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3efe369 elementor-widget elementor-widget-image\" data-id=\"3efe369\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"72\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Number1.png\" class=\"attachment-full size-full wp-image-81530\" alt=\"Penetration Testing tools- NMAP | EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-089b300\" data-id=\"089b300\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24109e2 elementor-widget elementor-widget-heading\" data-id=\"24109e2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Determine the critical components of the network<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b819d92 elementor-widget elementor-widget-text-editor\" data-id=\"b819d92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo avoid major damages, replicate your organizational data, and store it in a remote location. As business networks are complex, note the backup locations, which will help the IT staff to recover the network quickly, whenever required.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d8edc9c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8edc9c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff4b878\" data-id=\"ff4b878\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d5ee7fe elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d5ee7fe\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-689ef48\" data-id=\"689ef48\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a6bc003 elementor-widget elementor-widget-image\" data-id=\"a6bc003\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"72\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Number2.png\" class=\"attachment-full size-full wp-image-81531\" alt=\"Penetration Testing tools- Metasploit| EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-579c7d3\" data-id=\"579c7d3\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6401112 elementor-widget elementor-widget-heading\" data-id=\"6401112\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Identify points of failure in the network and address them<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3418ed0 elementor-widget elementor-widget-text-editor\" data-id=\"3418ed0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tOnce you identify the critical components, create a plan to protect these assets. The points of failure can jeopardize the entire network. So, address them with software failover features and other required tools.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8e63426 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8e63426\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ed7d72a\" data-id=\"ed7d72a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0aa416d elementor-widget elementor-widget-image\" data-id=\"0aa416d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"72\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Number3.png\" class=\"attachment-full size-full wp-image-81532\" alt=\"Penetration Testing tools- Burp Suite Professional | EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9190e6e\" data-id=\"9190e6e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-634767f elementor-widget elementor-widget-heading\" data-id=\"634767f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Develop a workforce continuity plan<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d63b244 elementor-widget elementor-widget-text-editor\" data-id=\"d63b244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDuring a disaster or a security breach, some locations or processes become inoperable and inaccessible, but this should not affect the regular business operations and employee security. Build a plan with virtual private networks (VPNs) and secure web gateways to help the staff continue their work without stress.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-14e9774 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"14e9774\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7402b76\" data-id=\"7402b76\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-46109c4 elementor-widget elementor-widget-image\" data-id=\"46109c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"72\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Number4.png\" class=\"attachment-full size-full wp-image-81533\" alt=\"Penetration Testing tools- OWASP-ZAP| EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-738f468\" data-id=\"738f468\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b28cb70 elementor-widget elementor-widget-heading\" data-id=\"b28cb70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Form a cyber security incident response plan<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb21cc7 elementor-widget elementor-widget-text-editor\" data-id=\"fb21cc7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tDocument a formal plan with the list of roles and responsibilities of incident responders, tools and technologies involved, and effective data recovery processes.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-24bb28d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"24bb28d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a9519ee\" data-id=\"a9519ee\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-627c1bd elementor-widget elementor-widget-image\" data-id=\"627c1bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"98\" height=\"72\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/02\/Number5.png\" class=\"attachment-full size-full wp-image-81534\" alt=\"Penetration Testing tools- Hydra| EC-Council\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-ea36f24\" data-id=\"ea36f24\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1b4aab elementor-widget elementor-widget-heading\" data-id=\"d1b4aab\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Staff training<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65a004b elementor-widget elementor-widget-text-editor\" data-id=\"65a004b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEvery employee should be well-aware of different types of cyberattacks and how to avoid them.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c6f2e8 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2c6f2e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"#five-steps\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read about phases of Incident response<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ae8a7c elementor-align-center elementor-widget elementor-widget-button\" data-id=\"1ae8a7c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"#plan\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more about How to Frame an Incident Response Plan<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-202b752 elementor-widget elementor-widget-heading\" data-id=\"202b752\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is an Incident Response Team?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ced4ab1 elementor-widget elementor-widget-text-editor\" data-id=\"ced4ab1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A computer security incident response team (CSIRT) helps in mitigating the impact of security threats. With the rising number of security threats, organizations need a dedicated team for\u00a0<a href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-management-response\/\" target=\"_blank\" rel=\"noopener\">incident response.<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f1199c elementor-widget elementor-widget-text-editor\" data-id=\"0f1199c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhat does an incident response team do?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b90f64f elementor-widget elementor-widget-text-editor\" data-id=\"b90f64f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe CSIRT comes into action whenever an unexpected event occurs. The roles and responsibilities of an incident response team are listed below. The team generally comprises of incident response analysts, incident handlers, network engineers, and a few other dedicated professionals.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1c3c82 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a1c3c82\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Create and maintain an IR plan<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Analyze the security incident<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Manage internal communications and alerts whenever an incident occurs<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Offer easy communication with stakeholders and the press whenever needed<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Remediate incident<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Recommend tools, technologies, policy, and governance after the incident<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af4d256 elementor-widget elementor-widget-heading\" data-id=\"af4d256\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">How to build an incident response team?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c77ae4 elementor-widget elementor-widget-text-editor\" data-id=\"2c77ae4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA core incident response team consists of \u2013\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-637791c elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"637791c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Incident Response Manager:<\/b> The manager supervises the entire process and prioritizes the actions during the detection, analysis, containment, and recovery phases.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Security Analysts:<\/b> These professionals work to recover the affected network. There are two types of security analysts in an IR team \u2013<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6010b25 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"6010b25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Triage Analysts \u2013 They look for potential threats and filter out false positives.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Forensic Analysts \u2013 They keep digital evidence preserved to conduct forensic investigation against the incident.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-060d480 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"060d480\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"26.705\" height=\"25.248\" viewBox=\"0 0 26.705 25.248\"><g id=\"lock_r\" transform=\"translate(13.353 12.624)\"><path id=\"Path_691\" data-name=\"Path 691\" d=\"M14.22,12.5l.445,2.558a.346.346,0,0,1-.341.405H12.381a.346.346,0,0,1-.341-.405l.445-2.558a.115.115,0,0,0-.038-.107,1.383,1.383,0,1,1,1.811,0A.115.115,0,0,0,14.22,12.5ZM14.059,0H12.646a4.07,4.07,0,0,0-4.07,4.07v2.2h2.091V4.094a2,2,0,0,1,2-2h1.364a2,2,0,0,1,2,2V6.27h2.091V4.07A4.07,4.07,0,0,0,14.059,0ZM26.705,16.57a.254.254,0,0,1-.469.137h-1.98l-.958-.958H19.752V15.8l-.117.118h-.314v.337h.314l.117.118v.063h3.741V17.9a.255.255,0,1,1-.274,0v-1.2H19.752v.055l-.117.118h-.314v.337h.314l.117.118V17.4h2.174v1.324a.255.255,0,1,1-.275,0V17.678h-1.9v.049l-.117.117h-.314a.628.628,0,0,1-.626.626h-.212v.313l-.117.118h-.059v1.49l.566.566h2.334a.254.254,0,1,1,0,.274H18.759l-.726-.727V18.9h-.059l-.118-.118v-.313H17.52v.313L17.4,18.9h-.053v2.333l.791.792h.717V23.78a.255.255,0,1,1-.274,0V22.3h-.556l-.952-.952V18.9H17.01l-.117-.118v-.313h-.337v.313l-.117.118h-.051v2.9l1.228,1.228v1.751a.255.255,0,1,1-.274,0V23.142l-1.228-1.228V18.9h-.067l-.118-.118v-.313h-.337v.313l-.118.118H15.42v2.9l1.235,1.235v1.744a.255.255,0,1,1-.274,0v-1.63l-1.235-1.235V18.9h-.063l-.117-.118v-.313h-.337v.313l-.117.118h-.056v5.483l-.74.739H12.568a.255.255,0,1,1-.008-.274H13.6l.579-.579V18.9h-.061L14,18.784v-.313h-.337v.313l-.118.118h-.055v1.98a.255.255,0,1,1-.274,0V18.9h-.063l-.117-.118v-.313H12.7v.313l-.117.118h-.048v3.206l.934.934v.738a.255.255,0,1,1-.274,0v-.624l-.934-.934V18.9h-.069l-.118-.118v-.313h-.337v.313l-.118.118h-.061v3.206l.928.927v.745a.255.255,0,1,1-.274,0v-.631l-.928-.927V18.9h-.057l-.117-.118v-.313h-.337v.313l-.117.118H10.59v5.877a.255.255,0,1,1-.274,0V18.9h-.051l-.118-.118v-.313H9.81v.313l-.118.118H9.636v4.247l-.784.784H8.188a.255.255,0,1,1,0-.274h.55l.623-.623V18.9H9.3l-.117-.118v-.313H8.846v.313l-.117.118H8.677v1.343l-.57.57v1.329a.255.255,0,1,1-.274.006V20.7l.57-.57V18.9H8.337l-.118-.118v-.313H8.01a.628.628,0,0,1-.626-.626H7.071l-.117-.117v-.059H5.691l-.637.637V20.2a.254.254,0,1,1-.274,0v-2l.8-.8H6.953v-.059l.117-.118h.313v-.337H7.071l-.117-.118V16.7H3.406l-.882.882v.868h-.88a.255.255,0,1,1,0-.275H2.25V17.47l1.043-1.042H6.953v-.056l.117-.118h.313v-.337H7.071L6.953,15.8v-.058h-4.5l-.774.775H.469a.255.255,0,1,1,0-.274H1.56l.774-.775H6.953v-.06l.117-.118h.313v-.337H7.071l-.117-.118v-.047H3.359a.254.254,0,1,1,.015-.274H6.953v-.071l.117-.118h.313V13.99H7.071l-.117-.118v-.061H2.529v.936H1.634a.254.254,0,1,1,.018-.274h.6v-.936h4.7v-.057l.117-.117h.313v-.337H7.071l-.117-.117v-.064H2.41a.254.254,0,1,1,0-.275H6.953v-.053l.117-.118h.313v-.337H7.071l-.117-.118v-.056H3.293l-.962-.962H1.644a.255.255,0,1,1,0-.274h.8l.962.962H6.953v-.062l.117-.117h.313V11.1H7.071l-.117-.117v-.051H5.125a.255.255,0,1,1,.01-.275H6.953V10.59l.117-.118h.313v-.337H7.071l-.117-.118V9.951H3.293l-.958-.958H.469a.255.255,0,1,1,0-.274h1.98l.958.958H6.953V9.626l.117-.117h.313V9.172H7.071l-.117-.117V8.991H3.212V7.521a.255.255,0,1,1,.274,0v1.2H6.953V8.662l.117-.118h.313V8.208H7.071L6.953,8.09V8.022H4.779V6.7a.255.255,0,1,1,.275,0V7.748h1.9V7.7l.117-.117h.313a.628.628,0,0,1,.626-.626H18.7a.628.628,0,0,1,.626.626h.314l.117.117v.059h1.262l.637-.636V5.229a.254.254,0,1,1,.274,0v2l-.8.8H19.752V8.09l-.117.118h-.314v.337h.314l.117.118v.061H23.3l.882-.882V6.974h.88a.254.254,0,1,1,0,.274h-.606v.707L23.413,9H19.752v.056l-.117.117h-.314v.337h.314l.117.117v.058h4.5l.774-.775h1.205a.255.255,0,1,1,0,.274H25.145l-.774.775H19.752v.06l-.117.118h-.314v.337h.314l.117.118v.047h3.594a.254.254,0,1,1-.015.275H19.752v.071l-.117.117h-.314v.337h.314l.117.117v.061h4.425v-.936h.894a.255.255,0,1,1-.018.274h-.6v.936h-4.7v.057l-.117.118h-.314V12.4h.314l.117.118v.064H24.3a.254.254,0,1,1,0,.274H19.752v.053l-.117.118h-.314v.337h.314l.117.118v.056h3.661l.962.962h.686a.255.255,0,1,1,0,.274h-.8l-.962-.962H19.752v.061l-.117.118h-.314v.337h.314l.117.118V14.5H21.58a.254.254,0,1,1-.01.274H19.752v.066l-.117.118h-.314v.337h.314l.117.118v.067h3.661l.958.958h1.866a.254.254,0,0,1,.469.137ZM21.652,14.64a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,14.64Zm3.487,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,14.636Zm-.766-1.918a.137.137,0,1,0,.137-.137A.138.138,0,0,0,24.372,12.718Zm.766-1.89a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,10.829Zm-1.724-.043a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.415,10.786Zm2.9-1.74a.137.137,0,1,0,.137-.137A.137.137,0,0,0,26.314,9.046ZM25.139,7.111a.137.137,0,1,0,.137-.137A.137.137,0,0,0,25.139,7.111Zm-3.487-2.1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.652,5.015ZM5.054,6.484a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,6.484Zm-1.567.823a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.486,7.307ZM.392,8.856a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,8.856Zm4.662,1.929a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,10.786Zm-3.487,0a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,10.79Zm.766,1.917a.137.137,0,1,0-.137.137A.138.138,0,0,0,2.333,12.707ZM1.567,14.6a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,14.6Zm1.724.043a.137.137,0,1,0-.137.137A.137.137,0,0,0,3.291,14.64Zm-2.9,1.74a.137.137,0,1,0-.137.137A.137.137,0,0,0,.392,16.38Zm1.175,1.935a.137.137,0,1,0-.137.137A.137.137,0,0,0,1.567,18.315Zm3.487,2.1a.137.137,0,1,0-.137.137A.137.137,0,0,0,5.054,20.411Zm2.92,1.813a.137.137,0,1,0,.137.137A.137.137,0,0,0,7.974,22.224ZM8.111,23.8a.137.137,0,1,0-.137.137A.137.137,0,0,0,8.111,23.8Zm4.1.2a.137.137,0,1,0,.137-.137A.137.137,0,0,0,12.213,23.994Zm.982,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,13.195,23.994Zm-.708,1a.137.137,0,1,0-.137.137A.138.138,0,0,0,12.487,24.993Zm3.894,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,16.381,24.993Zm.961,0a.137.137,0,1,0,.137-.137A.137.137,0,0,0,17.341,24.993Zm1.242-1a.137.137,0,1,0,.137-.137A.137.137,0,0,0,18.583,23.994Zm2.7-2.9a.137.137,0,1,0,.137-.137A.137.137,0,0,0,21.284,21.1Zm-10.695,3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,10.59,24.993Zm2.9-3.9a.137.137,0,1,0-.137.137A.137.137,0,0,0,13.493,21.1Zm4.556-8.383a4.7,4.7,0,1,0-4.7,4.7A4.7,4.7,0,0,0,18.049,12.713Zm3.6,6.229a.137.137,0,1,0,.137-.137A.138.138,0,0,0,21.652,18.942Zm1.567-.822a.137.137,0,1,0,.137-.137A.137.137,0,0,0,23.219,18.119Zm3.369-1.549a.137.137,0,1,0-.137.137A.137.137,0,0,0,26.588,16.57Z\" transform=\"translate(-13.353 -12.624)\" fill=\"#ec2024\"><\/path><\/g><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Threat Researchers:<\/b> They offer threat intelligence and context related to the incident.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-070736c elementor-widget elementor-widget-text-editor\" data-id=\"070736c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Also check out:<\/strong> 5 Common Challenges Incident Handling and Response Teams Face<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bf01e3 elementor-widget elementor-widget-heading\" data-id=\"1bf01e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professional Tools Used in Incident Response<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f16980 elementor-widget elementor-widget-text-editor\" data-id=\"1f16980\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Businesses are facing a rise in security incidents. In the technologically driven world, these incidents have become unavoidable. That is why the incident response team needs powerful tools to defeat and contain security events.<\/p><p>Security incidents are capable of crippling a business. They can lead to financial loss, reputational loss, negative publicity, and even a negative impact on the sales and stock market. It can strip down an organization from its long-earned credibility. With the help of tools, incident responders can quickly detect, analyze, and respond to intrusions.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02caa40 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"02caa40\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Become a Certified Incident Handler<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b86981 elementor-widget elementor-widget-heading\" data-id=\"0b86981\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Best Incident Response Tools<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e9cd728 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e9cd728\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-38a93ec\" data-id=\"38a93ec\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-bba79ad elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"bba79ad\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-844d960\" data-id=\"844d960\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f64c2f9 elementor-widget elementor-widget-text-editor\" data-id=\"f64c2f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLogRhythm\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-5cdca25\" data-id=\"5cdca25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c28c36d elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"c28c36d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt is a NextGen SIEM platform that offers comprehensive security analytics, user and entity behavior analytics (UEBA), network detection and response (NDR), and security orchestration, automation, and response (SOAR).\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-ce05b4a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ce05b4a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-055f321\" data-id=\"055f321\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d80c30b elementor-widget elementor-widget-text-editor\" data-id=\"d80c30b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tSumo Logic\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8660ef9\" data-id=\"8660ef9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-321e8cd elementor-widget elementor-widget-text-editor\" data-id=\"321e8cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe tool is best for securing cloud infrastructures and advanced applications. It provides the required analytics and insights.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-94f5804 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"94f5804\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-8337184\" data-id=\"8337184\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4fd1bcb elementor-widget elementor-widget-text-editor\" data-id=\"4fd1bcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInsightIDR\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-57f53b3\" data-id=\"57f53b3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-37aeda5 elementor-widget elementor-widget-text-editor\" data-id=\"37aeda5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis SaaS SIEM tool is used for modern threat detection and response.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-7efa303 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7efa303\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-85f84d9\" data-id=\"85f84d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b16d6a9 elementor-widget elementor-widget-text-editor\" data-id=\"b16d6a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tCB Response\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-af08a33\" data-id=\"af08a33\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4e8608a elementor-widget elementor-widget-text-editor\" data-id=\"4e8608a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIt arms incident response team with real-time response capabilities and expert threat analysis.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-af279a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"af279a9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-3c21efb\" data-id=\"3c21efb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24e5676 elementor-widget elementor-widget-text-editor\" data-id=\"24e5676\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIBM QRadar\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9ac4910\" data-id=\"9ac4910\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8bcd226 elementor-widget elementor-widget-text-editor\" data-id=\"8bcd226\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis tool accurately detects and prioritizes security threats.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cf5c82d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cf5c82d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddbec20\" data-id=\"ddbec20\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dea7eec elementor-align-center elementor-widget elementor-widget-button\" data-id=\"dea7eec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"https:\/\/www.eccouncil.org\/train-certify\/ec-council-certified-incident-handler-ecih\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more about courses in Incident Handling <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7139fcc elementor-widget elementor-widget-heading\" data-id=\"7139fcc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Incident Response Jobs<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cca7a4 elementor-widget elementor-widget-text-editor\" data-id=\"8cca7a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe results are for the US alone\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2658b93 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2658b93\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-c8c7723\" data-id=\"c8c7723\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bd7ad6a elementor-widget elementor-widget-heading\" data-id=\"bd7ad6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Incident Response Manager Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d650094 elementor-widget elementor-widget-image\" data-id=\"d650094\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"589\" height=\"188\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Incident-Response-Manager-Jobs-1.png\" class=\"attachment-full size-full wp-image-81640\" alt=\"Incident Response Manager Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Incident-Response-Manager-Jobs-1.png 589w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Incident-Response-Manager-Jobs-1-300x96.png 300w\" sizes=\"(max-width: 589px) 100vw, 589px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3f8146a\" data-id=\"3f8146a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-db34aa6 elementor-widget elementor-widget-heading\" data-id=\"db34aa6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Security Analysts Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c3a89e4 elementor-widget elementor-widget-image\" data-id=\"c3a89e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"590\" height=\"177\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Security-Analysts-Jobs-1.png\" class=\"attachment-full size-full wp-image-81641\" alt=\"Security Analysts Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Security-Analysts-Jobs-1.png 590w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Security-Analysts-Jobs-1-300x90.png 300w\" sizes=\"(max-width: 590px) 100vw, 590px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3f8eb3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3f8eb3\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-a379025\" data-id=\"a379025\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f634996 elementor-widget elementor-widget-heading\" data-id=\"f634996\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Triage Analysts Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7206e24 elementor-widget elementor-widget-image\" data-id=\"7206e24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"153\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Triage-Analysts-Jobs-1.png\" class=\"attachment-full size-full wp-image-81642\" alt=\"Triage Analysts Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Triage-Analysts-Jobs-1.png 560w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Triage-Analysts-Jobs-1-300x82.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3d062f7\" data-id=\"3d062f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-426c861 elementor-widget elementor-widget-heading\" data-id=\"426c861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Forensic Analysts Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aaeccfa elementor-widget elementor-widget-image\" data-id=\"aaeccfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"154\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1.png\" class=\"attachment-full size-full wp-image-81643\" alt=\"Forensic Analysts Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1.png 560w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1-300x83.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-93a60a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"93a60a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e607bfe\" data-id=\"e607bfe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-eaabf93 elementor-widget elementor-widget-heading\" data-id=\"eaabf93\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Threat Intelligence Researchers Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bc0226 elementor-widget elementor-widget-image\" data-id=\"3bc0226\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"149\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Threat-Intelligence-Researchers-Jobs-1.png\" class=\"attachment-full size-full wp-image-81644\" alt=\"Threat Intelligence Researchers Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Threat-Intelligence-Researchers-Jobs-1.png 560w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Threat-Intelligence-Researchers-Jobs-1-300x80.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1df1599 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile\" data-id=\"1df1599\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9adb317 elementor-widget elementor-widget-heading\" data-id=\"9adb317\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Forensic Analysts Jobs<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0c6ea4 elementor-widget elementor-widget-image\" data-id=\"a0c6ea4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"560\" height=\"154\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1.png\" class=\"attachment-full size-full wp-image-81643\" alt=\"Forensic Analysts Jobs\" srcset=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1.png 560w, https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/Forensic-Analysts-Jobs-1-300x83.png 300w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-75865df elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"75865df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fcefe04\" data-id=\"fcefe04\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8e46f86 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"8e46f86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg\" href=\"#five-steps\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Read more about 5 common challenges faced by Incident Response <\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f7f98c5 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7f98c5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb7d724\" data-id=\"eb7d724\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-73651ed elementor-widget elementor-widget-heading\" data-id=\"73651ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Average Salary of an Incident Handler<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-857d0e3 elementor-widget elementor-widget-text-editor\" data-id=\"857d0e3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAccording to salary.com, the average salary of an Incident Handler in the United States ranges from <span style=\"color:#428BCA;\">$79,213 to $100,341.<\/span>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb49381 elementor-widget elementor-widget-text-editor\" data-id=\"fb49381\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The fluctuation in salary relies on a few factors, such as the qualification and skills of the candidate. An expertise in several incident response tools helps an\u00a0<a href=\"https:\/\/www.eccouncil.org\/incident-handling\/\" target=\"_blank\" rel=\"noopener\">incident responder<\/a>\u00a0earn more. Apart from that, the location of work can also have an impact on earning.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d95124 elementor-widget elementor-widget-heading\" data-id=\"5d95124\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A Day in the Life of An Incident Responder<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf42dad elementor-widget elementor-widget-text-editor\" data-id=\"cf42dad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tAn incident responder must have visibility of how everyone is contributing to the network traffic. The actions of these professionals revolve around the primary objectives of reducing security risks and improving customer trust.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0e0bd13 elementor-widget elementor-widget-text-editor\" data-id=\"0e0bd13\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe day of an incident responder starts with looking for malware in the user systems. These professionals use Endpoint Detection and Response (EDR) for monitoring and responding to cyber threats. Once done, they shift to the detection of malware in the servers. They also perform threat hunting and proactive monitoring. They build phishing campaigns to understand internal and external threats. They are also responsible for device management that includes creating a sandbox environment or honeypot. These professionals take part in several meetings and draft important reports.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-41f7235 elementor-widget elementor-widget-video\" data-id=\"41f7235\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=VKn_Cm3_EGU&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4374f10 elementor-widget elementor-widget-heading\" data-id=\"4374f10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Become a Certified Incident Handler?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19c576a elementor-widget elementor-widget-text-editor\" data-id=\"19c576a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tEC-Council designed a comprehensive incident handling certification course that offers a specialist level incident response skills and knowledge. The incident handling training program will help you detect, analyze, contain, respond to, and recover from a security incident. To gain next level incident handling skills, join EC-Council Certified Incident Handler today!\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Incident response is a structured approach to handle various types of security incidents, cyber threats, and data breaches. The incident response methodology aims to identify, contain, and minimize the cost of a cyberattack or a live incident. A well-built incident response (IR) plan can fix a potential vulnerability to prevent future attacks, but it is&hellip;<\/p>\n","protected":false},"author":32,"featured_media":81629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12082],"tags":[],"class_list":{"0":"post-81626","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-incident-handling"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>What is Incident Response | Become a Incident Handler | EC-Council<\/title>\n<meta name=\"description\" content=\"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Incident Response | Become a Incident Handler | EC-Council\" \/>\n<meta property=\"og:description\" content=\"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-07T04:20:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-26T08:15:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-feature-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"521\" \/>\n\t<meta property=\"og:image:height\" content=\"521\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What is Incident Response | Become a Incident Handler | EC-Council\" \/>\n<meta name=\"twitter:description\" content=\"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-feature-1.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"What is Incident Response\",\"datePublished\":\"2024-03-07T04:20:09+00:00\",\"dateModified\":\"2026-02-26T08:15:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/\"},\"wordCount\":2501,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-Incident-Response-thumb.jpg\",\"articleSection\":[\"Incident Handling\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/\",\"name\":\"What is Incident Response | Become a Incident Handler | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-Incident-Response-thumb.jpg\",\"datePublished\":\"2024-03-07T04:20:09+00:00\",\"dateModified\":\"2026-02-26T08:15:56+00:00\",\"description\":\"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-Incident-Response-thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/What-is-Incident-Response-thumb.jpg\",\"width\":521,\"height\":521},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/incident-handling\\\/what-is-incident-response\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Incident Handling\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/incident-handling\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"What is Incident Response\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What is Incident Response | Become a Incident Handler | EC-Council","description":"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/","og_locale":"en_US","og_type":"article","og_title":"What is Incident Response | Become a Incident Handler | EC-Council","og_description":"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2024-03-07T04:20:09+00:00","article_modified_time":"2026-02-26T08:15:56+00:00","og_image":[{"width":521,"height":521,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-feature-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_title":"What is Incident Response | Become a Incident Handler | EC-Council","twitter_description":"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.","twitter_image":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-feature-1.jpg","twitter_misc":{"Written by":"EC-Council","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"What is Incident Response","datePublished":"2024-03-07T04:20:09+00:00","dateModified":"2026-02-26T08:15:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/"},"wordCount":2501,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-thumb.jpg","articleSection":["Incident Handling"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/","name":"What is Incident Response | Become a Incident Handler | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-thumb.jpg","datePublished":"2024-03-07T04:20:09+00:00","dateModified":"2026-02-26T08:15:56+00:00","description":"Understand what incident response is in cybersecurity. Explore the key steps, best practices, and why a strong incident response plan is critical to minimizing cyber threats.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-thumb.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2024\/03\/What-is-Incident-Response-thumb.jpg","width":521,"height":521},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/incident-handling\/what-is-incident-response\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Incident Handling","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/incident-handling\/"},{"@type":"ListItem","position":4,"name":"What is Incident Response"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81626","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=81626"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/81626\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/81629"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=81626"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=81626"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=81626"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}