Breach Response , Data Breach , Incident & Breach Response

How to Strengthen Incident Response

DF Labs' Mike Fowler on the Need for Coordination
Mike Fowler, vice president of professional services, DF Labs

Effective incident response requires fine coordination between technical and human resources, says Mike Fowler of DF Labs, an incident-response platform provider.

See Also: How Tri-Counties Regional Center Secures Sensitive Files and Maintains HIPAA Compliance

"Think about the last cyberattack you read about [and what] we see is that we need more cyber-trained people," Fowler says in an interview at Information Security Media Group's recent New York Fraud and Breach Prevention Summit. "Part of the problem is the human element, and I think part of the solution is taking what we have - the resources, be they hardware, software or human - and making them better."

At the summit, Fowler conducted a session on Automation as a Force Multiplier in Cyber Incident Response.

In the interview, Fowler:

  • Provides an example how a force multiplier strengthens an enterprise's incident response;
  • Discusses the importance of building a qualified, cyber-trained incident response team;
  • Explains why keeping records of how organizations handle incident responses will help expedite the training of new employees.

Fowler, vice president of professional services at DF Labs, is responsible for leading the Milano, Italy, company's services team expansion into the United States. He previously spent 14 years in law enforcement, serving as a security police officer in the U.S. Air Force, attaining the rank of staff sergeant; deputy sheriff in Iredell County, N.C.; and detective in Hunterville, N.C.


About the Author

Eric Chabrow

Eric Chabrow

Host & Producer, ISMG Security Report; Executive Editor, GovInfoSecurity & InfoRiskToday

Chabrow hosts and produces the semi-weekly podcast ISMG Security Report and oversees ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.