Create your data breach response plan

March 13, 2019
Author: Justin Hall
Blog | Security
Man standing in server room, looking at computer

Every so often, we get a panicked call from a client that is experiencing an information security breach. The client may have a rampant outbreak of ransomware, a defaced website, or worse … a complaint about lost or stolen data. The client needs to understand what to do next, and they don’t have time for a fancy sales pitch. This scenario is why we’re passionate about helping clients create a data breach response plan.

Resources to help you create a data breach response plan

CBTS consultants have stared down the business end of an information security breach. And when you come out the other side, there’s a lot of learning that needs to be done.

One of the first lessons: Prepare yourself before the next information security breach, and create a data breach response plan. Think carefully about the things you want to do before, during, and after an incident so that the information security breach does not become the end of your company.

CBTS has published a whitepaper based on our experiences with customers, as well as one of the best publications available on the subject: NIST’s Special Publication 800-61r2. The full document is worth a read.

We’ve combined the guts of their recommendations with our experiences to provide a brief, accessible guide for security and IT leaders and practitioners. This guide offers key insights on how to handle an information security breach, which will ultimately inform your data breach response plan. In our whitepaper you will find steps on how to:

  1. Properly and effectively prepare for an attack.
  2. Detect and analyze an intruder.
  3. Contain the attacker, eradicate their presence on your network, and recover the impacted assets
  4. Assess your learnings.

CBTS is ready to serve as your trusted advisor

CBTS recommends partnering with a trusted incident response provider to assist in creating a data breach response plan, especially if your organization has no prior history of performing this function internally. A third party brings expertise and objectivity that are paramount to conducting a sound forensic investigation. We work with services providers in the space and can help gather your requirements and connecting you with a provider that meets your needs.

CBTS Security experts can assist in all areas of maturing your incident response practice. Our consulting group can help assess your readiness to respond to a breach. And our product specialists can help collect your requirements and find best-of-breed solutions to complete your security strategy.

Learn more: How you can improve your incident response capability to an information security breach

Related Stories

Schedule a complimentary
30-minute consultation with an engineer

Join the Conversation!

Related Solutions