1 00:00:00,460 --> 00:00:08,000 And the last video we covered the fundamentals of creating an incident response plan the next step after 2 00:00:08,000 --> 00:00:15,350 your Incident Response Plan has been created as to form an internal computer security incident response 3 00:00:15,350 --> 00:00:23,660 team an incident response team is responsible for providing Incident Response Services to part or all 4 00:00:23,660 --> 00:00:25,120 of your organization. 5 00:00:26,100 --> 00:00:32,490 The team receives information on possible incidents investigates them and takes action to ensure that 6 00:00:32,490 --> 00:00:36,630 the damage caused by the incidents are minimized. 7 00:00:36,630 --> 00:00:43,260 This team could be in House members from your organization's security team or it can even be outsourced 8 00:00:43,530 --> 00:00:51,420 to an external group like a managed security service provider and ask us please our companies that provide 9 00:00:51,660 --> 00:00:55,680 incident response and managed security services. 10 00:00:55,680 --> 00:01:04,110 Some I espies like AT&T and CenturyLink offer these services and even Cisco has an incident response 11 00:01:04,170 --> 00:01:13,830 service at the national level C-s parties and CERT Computer Emergency Response teams worked together 12 00:01:14,100 --> 00:01:19,150 to help protect partners and citizens from cyber security threats. 13 00:01:20,240 --> 00:01:28,450 The US cert for example is used to protect all Americans by responding to major incidents analyzing 14 00:01:28,450 --> 00:01:36,740 threats and exchanging critical cybersecurity information with trusted partners around the world. 15 00:01:36,790 --> 00:01:42,880 The U.S. asserts critical mission activities include providing cyber security protection to federal 16 00:01:42,910 --> 00:01:52,540 civilians developing timely and actionable information responding to incidents and analyzing data about 17 00:01:52,780 --> 00:02:00,730 emerging cyber threats and collaborating with foreign governments and international entities to enhance 18 00:02:00,730 --> 00:02:09,670 the nation's cyber security posture one well-known Surt is the coordination center used at the Software 19 00:02:09,700 --> 00:02:12,470 Engineering Institute. 20 00:02:12,550 --> 00:02:21,460 They help solve cybersecurity problems by working with software vendors to resolve software vulnerabilities. 21 00:02:21,460 --> 00:02:28,320 They even work with organizations such as the FBI and the Homeland Security Department.