ISACA Journal Author Blog

ISACA > Journal > Practically Speaking Blog > Posts > Forensic Readiness Planning

Forensic Readiness Planning

| Published: 7/8/2013 7:56 AM | Category: Risk Management | Permalink | Email this Post | Comments (0)
Dauda Sule, CISA
 
With all the developments in IT, IT infrastructure and governance, there have been corresponding increases in risk, threats and attacks. It has also become imperative for organizations to respond to attacks and breaches and to ensure that their reputation and assets are safeguarded. The response to such violations is usually legal (or disciplinary when no laws are broken, but internal policies of such organizations are taunted or violated); to achieve this successfully, evidence must be collected and provided in a legally acceptable manner. There are also other claims that can be leveled for or against the organization (e.g. insurance claims, accusations of negligence) that would require presentation of evidence.
 
Forensic readiness planning helps to ensure that digital evidence is readily available in a legally acceptable manner in the event one of the aforementioned issues occurs.
 
Forensic readiness planning might appear to be cumbersome (another plan as if business continuity, disaster recovery and incidence response planning are not enough already) and expensive at first mention, but when examined closely, the benefits outweigh the cons. The forensic readiness plan works hand-in-hand with the business continuity, disaster recovery and incident response plans—augmenting one another. Forensic readiness planning can help cut the costs of investigation and data disclosure requirements, as digital evidence is gathered continuously and preserved. Forensic readiness planning discourages malicious activity by insiders who are aware that any such attempt could be easily discovered due to constant evidence collection. It also shows due diligence on the part of an organization reflecting good governance and regulatory compliance, improving the organization’s goodwill as well as status in the eyes of regulators and law enforcement. Other cyberthreats can be easily discovered and traced once forensic readiness planning is properly executed.
 
Read Dauda Sule’s recent Journal article:
Man in the Browser—A Threat to Online Banking,” ISACA Journal, volume 4, 2013.

Comments

There are no comments yet for this post.
Email