3 Keys to Responding Intelligently, Publicly to a Cyberattack

13 min read

Intelligent responses depend on three elements:

  1. Incident Response Planning
  2. Business Continuity Planning
  3. Crisis Communication Planning

There are numerous articles and memos deal with the topic of incident response, business continuity, and crisis communication plans. Many have been distributed through media outlets even. So you may be asking: why us, why now, and what more could we possible offer in this space?

We think the answer is pretty simple: sometimes you can’t get enough of a good thing. Similarly, there are fundamental topics that people still are having problems with. Translation: more homework to do. One subject area that evidently needs work is responding confidently to a cyberattack in an intelligent and public manner. There are a great deal of texts and certifications out there on these issues (some better than others of course), but if we could, we’d like to give you some “basic street talk” on these issues. Essentially, we want to present to you the issues in a way that you could discuss while having a coffee or drink.

We won’t name names, but there are real life examples of “good” responses. You intuitively know a good response. You feel a level of confidence that the company has the facts, knows the circumstances of what has happened, and is going “full steam ahead” to clean up whatever the mess is. Despite the situation being bad, you know that whoever is steering the ship has things “under control.”

And then there are the “other” responses. You intuitively know a bad response also. It’s the one with the bad smell, the train wreck you can’t watch but still want to, and the one where you throw up your arms and say to yourself “are you kidding me?! You can’t be that out of control!” In cases like this, you’ll normally see a swarm of regulators, stakeholders, investors, and the public directing a lot of “ahem” to the organization and its executives.

 Paradoxically almost, you seldom remember the “good” responses, but you never forget the bad one (they usually end up as case studies in business reviews and university textbooks).

Like we said, not naming names, but we want to give you some “quick hits” as to what we, the #CyberAvengers, feel works and what does not work when you have a cyber train wreck at your fingertips. Here goes:

Incident Response Planning

There are plenty of things that often come up concerning the importance of incident response (or “IR”) planning. First, the importance of having a plan cannot be understated. The worst time to figure out what to do or say if there is in the middle of cyberattack. Simply put, things get too crazy to think.

For instance, internet access might get disrupted, files might get encrypted, executives might get fired or suddenly retire, or revelations might occur indicating a major loss of customer information or financial data. All of these issues might indicate a range of problems from either a “manageable” to a “catastrophic” problem depending upon what happened. Problems get further compounded if the company is publicly traded, or is regulated by a federal or state agency (such as the SEC or the NY DFS) where the timeliness and accuracy of disclosures matter greatly, along with the reputation of the company or firm being attacked.

All stuff you know so far. Now comes the moment of not mucking it all up.

To minimize the impact of such an attack and to protect the company and its stakeholders, strong incident response plans have the following attributes: