Incident & Breach Response , Security Operations

How to Strengthen Incident Response

DF Labs' Mike Fowler on the Need for Coordination
Mike Fowler, vice president of professional services, DF Labs

Effective incident response requires fine coordination between technical and human resources, says Mike Fowler of DF Labs, an incident-response platform provider.

See Also: The Application Security Team's Framework For Upgrading Legacy Applications

"Think about the last cyberattack you read about [and what] we see is that we need more cyber-trained people," Fowler says in an interview at Information Security Media Group's recent New York Fraud and Breach Prevention Summit. "Part of the problem is the human element, and I think part of the solution is taking what we have - the resources, be they hardware, software or human - and making them better."

At the summit, Fowler conducted a session on Automation as a Force Multiplier in Cyber Incident Response.

In the interview, Fowler:

  • Provides an example how a force multiplier strengthens an enterprise's incident response;
  • Discusses the importance of building a qualified, cyber-trained incident response team;
  • Explains why keeping records of how organizations handle incident responses will help expedite the training of new employees.

Fowler, vice president of professional services at DF Labs, is responsible for leading the Milano, Italy, company's services team expansion into the United States. He previously spent 14 years in law enforcement, serving as a security police officer in the U.S. Air Force, attaining the rank of staff sergeant; deputy sheriff in Iredell County, N.C.; and detective in Hunterville, N.C.


About the Author

Eric Chabrow

Eric Chabrow

Retired Executive Editor, GovInfoSecurity

Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.