Remove Emergency Response Remove Event Remove Gap Analysis
article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

I suspect they are keeping their fingers crossed that there is no pollution incident or event which could be tied back to parts of SEPA not operating. Information has been given, but only when prompted by external events, such as The Times article and other articles on the data release. This has been well reported in the press.

article thumbnail

The SEPA Cyber Attack a Case Study

Plan B Consulting

I suspect they are keeping their fingers crossed that there is no pollution incident or event which could be tied back to parts of SEPA not operating. Information has been given, but only when prompted by external events, such as The Times article and other articles on the data release. This has been well reported in the press.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Detect: Develop and implement activities to identify cybersecurity events. Categories and subcategories are: Anomalies and events (DE.AE): The organization knows when anomalous activity occurs on your systems. Incidents are contained.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

Detect: Define the appropriate activities to identify the occurrence of a cybersecurity event. Detect: Develop and implement activities to identify cybersecurity events. Categories and subcategories are: Anomalies and events (DE.AE): The organization knows when anomalous activity occurs on your systems. Incidents are contained.