After collecting all cybersecurity information and their relevance to items and implementing TARA; we have one last step to finalize our continuous cybersecurity activities, which is the vulnerability management process. In this video course, “Cybersecurity Incident Response Plan”, we go through the process of creating a cybersecurity incident response and what should it include.


Before explaining the cybersecurity response plan in detail, we will start by going through the process of continuous cybersecurity activities again and defining what a cybersecurity incident is exactly to establish the fundamentals. Then, we will explain when and how the cybersecurity response plan becomes relevant during the vulnerability management process.


In the second part of the video, we provide a thorough explanation of each of the five main components of the cybersecurity incident response plan.



Course plan

All Videos
G13_5 Cybersecurity incident response plan