The preparation, detection, analysis, containment, eradication, and recovery necessary for responding to cyber attacks.
Incident Response training by Warren Raquel
Security and Log Analysis training by Mark Krenz
Trusted CI Blog posts related to incident response, situational awareness, log analysis, and security vulnerabilities.
Report or receive information about cyberinfrastructure vulnerabilities.