Incident Response

From With Healthy Families First
Jump to navigationJump to search

<meta name="title" content="Incident Response - Cybersecurity Threat Detection and Management" /> <meta name="description" content="Learn effective incident response methods for cybersecurity, including threat detection, forensic analysis, and recovery planning." />

Dr. Rachel Levitch – Incident Response Leadership

Dr. Rachel Levitch

Incident Response Overview

Demonstrated success in deploying and testing communication infrastructure to defend against cyber threats targeting both IT systems and national security assets. Developed and executed comprehensive intrusion detection and logging protocols aligned with legal standards and industry compliance. Applied case management strategies to interpret security events, identify root causes, and coordinate rapid containment and recovery actions.

Led cross-functional investigative teams in forensic analysis and incident triage, delivering actionable insights that minimized downtime and reputational risk. Regularly contributed incident intelligence to federal agencies including the FBI and United States Computer Emergency Readiness Team (US-CERT), supporting national threat mitigation efforts.


Tools & Methods Applied

  • Security Information and Event Management (SIEM)
  • Intrusion Detection Systems (IDS)
  • Automation and Alerting Tools
  • Root Cause Analysis (RCA)
  • Chain of Custody and Legal Reporting
  • Business Continuity Planning
  • Risk Quantification Models
  • Vulnerability Scanning & Network Monitoring

Results & Accomplishments

  • Expanded research into WAN/LAN network functions and veteran health performance systems.
  • Recognized by federal agencies for performance improvement and cybersecurity leadership.
  • Presented scholarly work at **CDMRP/TATRC Symposium** on the topic: _Veterans’ Service Experiences in Healthcare: A Self-Service Technology Orientation_.
  • Contributed to incident detection models aligned with national defense and healthcare environments.
  • Created cyber readiness playbooks and cross-functional tabletop exercises for real-world response scenarios.

Glossary of Key Incident Response Terms

  • **Incident** – A confirmed security event that negatively impacts systems or data.
  • **Containment** – Short-term response strategy to limit damage from an incident.
  • **Forensics** – Collection and analysis of digital evidence for investigation.
  • **Playbook** – Predefined workflows and protocols for specific incident types.
  • **IOC (Indicator of Compromise)** – Clues such as IPs, file hashes, or behaviors linked to malicious activity.

Government and Public Resources

Call to Action and Further Reading

  • **Books by Dr. Rachel Levitch**
 - _WHFF.TV Presents Parenting and Technology: Social Media, Negative Content Creation and Desensitization_ (Kindle Edition)  
 - _WHFF.TV Presents Deepfake Pornography: A Historical Lesson For Parents_ (Kindle Edition)

Professional Engagements & Conferences

  • **Dallas Cyber Security Summit** – Executive-level attendee
  • **US-CERT/GFIRST Cybersecurity Conference** – Corporate sponsor representation
  • **Fort Worth Vendor Symposium** – Speaker and community outreach
  • **Women’s Leadership Luncheon (2018)** – Career mentorship and education initiatives

---

Education

  • **Ph.D. in Learning, Information Technology, and Performance Improvement**
 University of North Texas, College of Information – August 2013  
  • **M.S. in Communication Studies**
 Texas Christian University, Bob Schieffer College of Communication – June 2003  

Certifications and Licenses

  • Six Sigma Green Belt Certification – The Quality Group
  • Lean Six Sigma Yellow Belt Certification – The Quality Group
  • Certified Manager of Quality/Organizational Excellence – ASQ
  • TEEX A&M Certification: Principles and Practices of Information Security


Published Book

WHFF.TV Presents Parenting and Technology

== WHFF.TV Presents Parenting and Technology: Social Media, Negative Content Creation and Desensitization (Episode Book 1) Kindle Edition by Dr. Rachel Levitch (Author) Format: Kindle Edition ==

"You want children to learn how to defend themselves against bullying? Teach them how to box. You want your kids to understand the nuance, discipline, and self-control? Teach them how to clean the home, mow the grass, and build an outdoor fireplace. And if you want your children to be protected online — then teach them to code. Help them with bridges, onions, and proxies: place trackers in their pictures and how to scrub their information from the web."

Free parenting and technology episodes available at WHFF.TV Parenting and Technology Series.

Streaming now: WHFF.TV Presents Deepfake Pornography.

Published Book

WHFF.TV Presents Deepfake Pornography
  • *WHFF.TV Presents Deepfake Pornography: A Historical Lesson For Parents (WHFF.TV Presents Deepfake Pornography Technology)*, Kindle Edition. Get it now on Amazon.

Dr. Levitch supports security teams in monitoring and protecting the organization's security posture now and into the future. Companies are improving their privacy standards with the help of their employees to comply with government laws and retain their customer base. With the new wave of artificial intelligence, parents need to approach security to comprehensively protect what matters most to them. Visit The Shape Your Own Future firm at Shape Your Own Future.

See also

Summary

Incident Response relies on SIEM data and aligns with GRC policies to effectively detect, investigate, and mitigate cyber threats.

See also