search menu icon-carat-right cmu-wordmark

Creating a Computer Security Incident Response Team

This one-day course is designed for managers and project leaders who have been tasked with implementing a computer security incident response team (CSIRT) or similar capability. This course provides a high-level overview of the key issues and decisions that must be addressed in establishing an incident management capability. The course can also be used as an introduction to incident management and CSIRT activities, responsibilities, and services for incident handlers and also for those who work with incident handlers. As part of the course, attendees will develop an action plan that can be used as a starting point in planning and implementing their specific capability.

The course is composed of lectures and class exercises. Participants will learn the requirements for establishing an effective CSIRT, the various organizational models for a CSIRT, the variety and level of services that can be provided by a CSIRT (based on the FIRST CSIRT Services Framework), and the types of resources and infrastructure needed to support a capability. Additionally, attendees will identify policies and procedures that should be established and implemented when creating such an entity.

Attendees may also want to register for the three-day companion course, Managing Computer Security Incident Response Teams.

Audience

  • current and prospective CSIRT managers; C-level managers such as CIOs, CSOs, CROs; and project leaders interested in establishing, starting, or understanding a CSIRT
  • other staff who interact with CSIRTs, incident management capabilities, or incident handlers and would like to gain a deeper understanding of how each operates. For example, CSIRT constituents, higher-level management, media relations, legal counsel, law enforcement, human resources, audit, insider risk, or risk management staff

Objectives

This course will help participants to

  • identify the requirements for establishing an effective CSIRT or incident management capability
  • strategically plan the development and implementation of a new capability
  • highlight issues associated with assembling a responsive, effective team of cybersecurity or incident handling professionals
  • identify policies and procedures that should be established and implemented
  • review various organizational models to determine the model appropriate for their organization or situation
  • recognize the variety and level of services that can be provided by an incident management capability

Topics

  • types of CSIRTs and incident management capabilities or security teams
  • incident management and the relationship to CSIRTs, Security Operations Centers (SOCs), Product Security Incident Response Teams (PSIRTs) and Information Sharing and Analysis Centers (ISACs)
  • prerequisites to planning an incident management capability
  • creating and institutionalizing a vision for the capability
  • developing appropriate mission, objectives, and level of authority
  • organizational issues, dependencies, needed integration, interfaces, and models
  • range and levels of provided services
  • funding issues
  • hiring and training initial and additional staff and subject matter experts (SMEs)
  • implementing relevant and supporting policies and procedures
  • requirements for an incident handling infrastructure
  • implementation and operational issues and strategies
  • collaboration and communication issues

Materials

The course may be delivered virtually or in-person. In either case, materials will be provided to participants digitally through the SEI Learning Management System (LMS). Participants will be expected to download the materials and either print them or bring their laptop or mobile device with the materials on them. If laptops or other devices are brought, they may only be used during course lectures and exercises for course work. Digital handouts will be included with the course materials.

Prerequisites

This course has no prerequisites.

Course Fees [USD]

  • U.S. Industry: $700.00
  • U.S. Govt/Academic: $550.00
  • International: $1,200.00

Schedule

This one-day course meets at the following times:

8:30 a.m.-4:30 p.m.

This course may be offered by special arrangement at customer sites. For details, please email course-info@sei.cmu.edu or telephone at +1 412-268-7388.




Course Questions?

Email: course-info@sei.cmu.edu
Phone: 412-268-7388

Related Courses

  • Advanced Topics in Incident Handling

    4 - Day Course

    This four-day course, designed for cybersecurity incident management and security operations center (SOC) technical personnel with several months of incident handling experience, addresses techniques for detecting and responding to current and emerging cybersecurity threats and attacks. Building on the methods and tools discussed in the...

    Learn More
  • Foundations of Incident Management

    4 - Day Course

    This four-day course provides foundational knowledge for those in security-related roles who need to understand the functions of an incident management capability and how best to perform those functions. It is recommended for those new to incident handling or security operations work. This course was recently updated in September 2022, including a...

    Learn More
  • Managing Computer Security Incident Response Teams

    3 - Day Course

    This three-day course provides current and future managers of computer security incident response teams (CSIRTs) with a pragmatic view of the issues that they will face in operating an effective team. The course provides insight into the work that incident management staff and managers may be expected to handle. The course also provides...

    Learn More
  • Assessing Information Security Risk Using the OCTAVE Approach

    3 - Day Course

    In this three-day course, participants learn to perform information security risk assessments using the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) Allegro method. The OCTAVE Allegro approach provides organizations a comprehensive methodology that focuses on information assets in their operational context. Risks...

    Learn More

Training courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.