Generate a detailed, step-by-step incident response playbook for a specific type of cyber security incident, including detection, containment, eradication, recovery, and post-incident analysis phases.
Task: generate a summary of a video. Input: [video title], [video transcript], [length of summary: e.g., 100 words, 200 words] Instruction: summarize the video transcript, focusing on the main topics and key takeaways. The summary should be concise and informative, providing a clear overview of the video's content. Adhere to the specified length constraint.
Unlock full access
This prompt is part of the premium pack "Advanced cyber threat defense toolkit".
Leverage AI to meticulously analyze a given threat intelligence report, extracting key indicators of compromise (IOCs), attacker tactics, techniques, and procedures (TTPs), and potential impacts.
Create a step-by-step playbook for customer success managers to proactively engage and retain customers identified as at-risk of churn.
Create a detailed, step-by-step incident response playbook for a specific type of system outage or performance degradation.