OH #@$%! I’VE BEEN BREACHED: SURVIVING A CYBER BREACH

Take a deep breath. Look to your IRP and survive the cyber breach.

It’s the nightmare of every CIO and modern organization – the moment you realize that your information technology systems have been breached and all eyes are on you to take corrective action. You’ve taken all safeguards, maintained your security systems, met the compliance requirements and you’ve still been breached. So, what do you do now?

Sit down, take a deep breath and follow the steps-outlined in your incident response plan (IRP). You start by notifying your operations professional and business stakeholders at the organization. Then, you follow the IRP guidelines to preserve artifacts of the cyber breach, stop the exfiltration of data, discontinue applications and return to normal operations. This sounds simple enough. But that’s because you’ve done your due diligence and maintained an IRP with detailed steps for your security provider to ensure that every unique need is met.

Preparing and maintaining an IRP is one of the most essential responsibilities an organization’s CIO has. There is nothing great about a cyber breach. However, there is a best way to handle one should a breach occur. Learn more about managing a cyber breach with our “OH #@$%! I’ve Been Breached: What to Do Next” paper and start preparing your organization for a secure recovery.