Exciting news! Thirdera has been acquired by Cognizant.

Read more
Contact Us
Nathan- neon man talking on cell phone in front of laptop-2 Nathan- neon man talking on cell phone in front of laptop-2

Security Incident Response

Improve consistency of prioritization with threat intelligence to simplify incident identification.

Blueprint Overview

3 WEEKS
arrow

Initiate & Plan

4 WEEKS
arrow

Execute

1 WEEK
arrow

Deliver

1 WEEK
arrow

Go-Live & Beyond

Initiate & Plan

3 WEEKS
arrow

Demo Security Incident, collect requirements and deliver stories for acceptance.

10 HRS Product Owner
11 HRS Scrum Master
25 HRS Development Team
8 HRS Customer Stakeholders
8 HRS Acceptance Testers
Weekly hours by role

Execute

4 WEEKS
arrow

Configure Security Incident as per best practice and customer requirements; continually show progress back to the customer and collect new requirements.

4 HRS Product Owner
8 HRS Scrum Master
43 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Deliver

1 WEEK
arrow

Provide functional and technical knowledge transfer and support customer acceptance testers.

14 HRS Product Owner
16 HRS Scrum Master
50 HRS Development Team
12 HRS Customer Stakeholders
18 HRS Acceptance Testers
Weekly hours by role

Go-Live & Beyond

1 WEEK
arrow

Promote code to production and provide Hyper-Care.

4 HRS Product Owner
8 HRS Scrum Master
22 HRS Development Team
3 HRS Customer Stakeholders
2 HRS Acceptance Testers
Weekly hours by role

Thirdera Staffing

role icon

Project Manager

Responsible for providing leadership and direction to achieve growth and transformation.

role icon

Technical Lead

Analyzes business requirements and provides system design while implementing system solutions.

role icon

Supporting Team as appropriate

Skilled resources will be assigned as needed to ensure the implementation meets your project objectives in the 8-week delivery timeframe.

James arms folded glasses purple-2 James arms folded glasses purple-2

Project Scope

Thirdera's Security Incident Response Blueprint includes a robust list of deliverables to set your Security program on course for long-term success. Guided by proven best practices, our team of advisory and technical experts configures and implements a solution best fit for your unique needs while establishing a foundation of knowledge to promote ongoing maturation. Key deliverables include:

  • One pre-built or file-feed SIEM Integration
  • Security Incident creation from email and alerts
  • Security Analyst workspace
  • Playbooks/runbooks configured by alert categories
  • Automated Risk score calculation
  • Security Incident and task auto-assignment
  • Service Level Agreements (SLA)
  • Notifications, reports, and dashboards
  • Functional overview, technical knowledge transfer, UAT support

Outcomes

 

Consolidated View

A single view of Security Incident Response
Icon-Approval

Improved Data Quality

Enriched Security Incidents using the Enterprise CMDB
Icon-Approval

Data-Backed Decisions

Faster and better-informed decision making through increased data insights and automation
Icon-Approval

Reduced Time to Resolution

Increased transparency and decreased Security Incident detection, containment, and remediation time
Icon-Approval

Repeatable Processes

Increased consistency in Security Incident handling using automated playbooks
Icon-Approval

Elevated Operational Efficiency

Increased efficiency through cross-source prioritization, automated assignment, and automated playbooks

Let's get started

 

Connect with our Security experts for a detailed look at what an assessment would look like at your organization and how to improve your cyber resilience and Security Incident Response processes. 

 

Get in touch