A documented set of instructions outlining how an organization detects, responds to, and recovers from cybersecurity incidents.
Incident Response Plan (IRP)
Incident Response Team (IRT)
A group of security professionals responsible for responding to and mitigating cybersecurity incidents.
Insider Threat
A security risk originating from within the organization—such as an employee, contractor, or partner—who may accidentally or intentionally cause harm by misusing access to systems or data.
Intrusion Detection System (IDS)
Security technology that detects potential security threats by analyzing network traffic and system logs. IDS solutions can detect and alert you to potential security incidents in real-time.
Log Retention (SIEM)
Involves conducting real-time evaluation of log files generated by various systems, applications, and network devices to immediately detect and respond to threats. By retaining logs, you can investigate security incidents, identify potential threats, and maintain compliance.