Reported Information of Security Incidents

Does your organisation conduct a root cause analysis for all information security incidents that are reported?

Yes. We adopt a 5-stage approach to handling any incidents:

  • Preparation

  • Detection

  • Triage and analysis

  • Containment and neutralisation

  • Post-incident learning (which includes root cause analysis)