Every so often, we get a panicked call from a client that is experiencing an information security breach. The client may have a rampant outbreak of ransomware, a defaced website, or worse … a complaint about lost or stolen data. The client needs to understand what to do next, and they don’t have time for a fancy sales pitch. This scenario is why we’re passionate about helping clients create a data breach response plan.
CBTS consultants have stared down the business end of an information security breach. And when you come out the other side, there’s a lot of learning that needs to be done.
One of the first lessons: Prepare yourself before the next information security breach, and create a data breach response plan. Think carefully about the things you want to do before, during, and after an incident so that the information security breach does not become the end of your company.
CBTS has published a whitepaper based on our experiences with customers, as well as one of the best publications available on the subject: NIST’s Special Publication 800-61r2. The full document is worth a read.
We’ve combined the guts of their recommendations with our experiences to provide a brief, accessible guide for security and IT leaders and practitioners. This guide offers key insights on how to handle an information security breach, which will ultimately inform your data breach response plan. In our whitepaper you will find steps on how to:
CBTS recommends partnering with a trusted incident response provider to assist in creating a data breach response plan, especially if your organization has no prior history of performing this function internally. A third party brings expertise and objectivity that are paramount to conducting a sound forensic investigation. We work with services providers in the space and can help gather your requirements and connecting you with a provider that meets your needs.
CBTS Security experts can assist in all areas of maturing your incident response practice. Our consulting group can help assess your readiness to respond to a breach. And our product specialists can help collect your requirements and find best-of-breed solutions to complete your security strategy.