May 29, 2018 By Joan Goodchild 3 min read

You have an incident response plan, right? But how do you know it’s effective? Is there anything you’re overlooking? What will happen at your organization in the event of a data breach or security incident? While many organizations have a plan in place, far fewer test it and are confident in it if the need to execute should arise.

March 2018 research from the Ponemon Institute found that 77 percent of respondents said their organization does not have a formal cybersecurity incident response plan. Almost half of the respondents said their organization’s plan is either informal and ad hoc — or nonexistent.

“They’re not prepared,” said Sean Mason, director of threat management and incident response at Cisco Security Advisory Services. “It should be the starting block.”

Read the Ponemon Institute’s Third Annual Study on the Cyber Resilient Organization

Get Started on Incident Response Improvements

Many security analysts and consultant agree: It’s time to get serious about incident response. With data breaches and other cyberattacks increasing annually, organizations should be well-prepared and secure. To ensure your plan is effective, it should include the following four elements.

1. It’s Tested Consistently

While many organizations claim to have an incident response plan, few actually put them to the test. This is mistake number one, because unless it’s been tested, you really have no idea if it is effective.

“The best organizations that I see who are prepared are ones that are doing that proactive work,” said Mason. “They’re doing tabletop exercises — they’re doing red team versus blue team.”

Much like exercise, routinely testing an incident response plan gives an organization the practice it needs to identify weak spots and make improvements. “Go through and simulate incidents, committing it to muscle memory as it’s tested on a routine basis,” said Mason.

2. It’s Detailed but Flexible

An incident response plan should include detail but also be flexible so it can be applied to different kinds of attacks and incidents.

A good incident response plan gives you enough lateral movement for a wide range of incidents,” said Steve Armstrong, a SANS Institute instructor and 20-year veteran of security and incident response. “I’ve articulated incident response plans in spreadsheets, and they have a table for each type of incident.”

Flexibility and variety in an IT plan also ensures it can be updated regularly — so it can evolve as cyberattacks change over time.

3. It’s Clear About Communication

Clear communication plans are also essential for incident response. Armstrong said many incident response plans are informal and don’t have a solid understanding of how the network comes into play in incident response communication.

“Plans need to make clear how post-incident communication will be secure,” Armstrong said. “It needs to be not on network, particularly if it has been compromised.”

Listen to the podcast: Get Smarter About Disaster Response

4. It’s Inclusive When It Comes to Stakeholders

A concise list of stakeholders and how each should be involved in incident response is also crucial. “An organization should understand its environment and what it’s trying to protect, and who is on its team,” Armstrong said. “Who is up-front striking goals and who is the safety net in back?”

“If it’s an incident with multiple machines, you should have already gone through and thought about security, networking, business and finance,” said Mason. “And who are your external partners that are going to help in a time of crisis? It is easy to think through and say, ‘We got this.’ But then think, ‘If I have 10,000 machines impacted by ransomware, who is going to do all that work?'”

An incident response plan should also include the intention to get your legal department involved as early on in the process as possible. “You should have involved legal right out of the gate,” said Mason. Your legal department can often advise if it’s necessary to involve law enforcement or other external partners.

Incident response remains a significant challenge for most organizations globally and is hindering cyber resilience. Consider these four recommendations to improve your plan.

More from Incident Response

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America. IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that…

Alert fatigue: A 911 cyber call center that never sleeps

4 min read - Imagine running a 911 call center where the switchboard is constantly lit up with incoming calls. The initial question, “What’s your emergency, please?” aims to funnel the event to the right responder for triage and assessment. Over the course of your shift, requests could range from soft-spoken “I’m having a heart attack” pleas to “Where’s my pizza?” freak-outs eating up important resources. Now add into the mix a volume of calls that burnout kicks in and important threats are missed.…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today