Any event that could have potential InfoSec implications.
Example:
A spam email is a security event because it may contain links to malware.
Organizations may witness thousands of identifiable security events daily.
Security Incident
A security event that could potentially require an investigation from the organization's incident response team.
Incident Response
A set of procedures that an investigator follows when examining a computer security incident.
Incident Management
The monitoring and detection of security events on a computer network and the execution of proper responses to those security events.
Incident Response Process
Preparation
An organization with a well-planned incident response procedure, a strong security posture, and a knowledgeable chief information security officer (CISO) will be able to limit damage:
Quickly discovering the breach
Having an internal response team ready to take action
Quickly obtaining forensics data
Beginning an incident response plan
Identification
The recognition of whether an event that occurs should be classified as an incident.
Once identified, you might be required to make contact with other groups or escalate the problem if necessary.
Containment
Isolating the problem
This phase might also include evidence gathering, and further investigation
Eradication
Removal of the attack or threat
Recovery
Retrieve data, repair systems, re-enable servers and networks.
Lessons Learned
Document the process and make any changes to procedures and processes that are necessary for the future.
Damage and loss should be calculated and that information should be shared with the accounting department of the organization.
The affected systems should be monitored for any repercussions.