When Things do Go Wrong

When Things do Go Wrong

This month, sadly, Tales From the Click has one fewer superfan. That’s because my wife Rachel’s Uncle Cliff passed away recently.

Uncle Cliff was 89 years old; he lived a wonderful life. The truth is, we used to think he might outlive us all.

He was super-fit. Always exercising, especially running (he was a runner before running was even a thing). Many marathons, including Boston the day Rachel was born.

He kept mentally fit too. Up until just a few years ago, he ran a small business shipping medical instruments to hospitals.

And, like any great uncle, he loved telling stories and had a terrific sense of humor. You haven’t lived until you’ve watched a senior laughing as he tries to teach a couple of preteens (my kids) how to dial a rotary phone!

I miss him and I know Rachel and my kids do too. 

When I think about Uncle Cliff, and despite his having done everything “right” in terms of longevity – exercising, staying mentally active, having a great attitude, enjoying close relationships with friends and family – sometimes, health issues catch up with you anyway. There are no guarantees.

The same can be said for your cybersecurity program. You can never eliminate risk, you can only take steps to minimize it. And even then, and despite your best efforts, you can still fall victim to an attack.

So, What do you do if that happens?

Three suggestions….

#1. Plan Ahead

The absolute worst time to plan for a cybersecurity incident is while it is happening! At that point, there will be too much chaos and too little time to make smart, informed decisions.

Instead, you need to get out in front by writing a thorough incident response plan – now. Then practicing it through “tabletop exercises.” No, things probably won’t unfold exactly as you had expected. But as Dwight D. Eisenhower famously said, “Plans are useless, but planning is indispensable.” 

Your incident response planning should include all your key departments, not just the technical ones. Depending on the specifics, there may be financial, legal, marketing, and customer messaging implications that result.

The more time and thought you dedicate to this up front, the less likely you are to be caught flat-footed should an attack succeed.

#2. Contact Your Cyber insurance Company Immediately

Your cyber insurance company is connected to all the relevant vendors and external players you may need. 

Like you, they want to minimize the extent of the damage. Unlike you, they have been through this before. So follow their lead. (Make sure any incident remediation resources you bring in are approved by your cyber insurance, so you don’t have a whopping bill.)

Your cyber insurance company can help with:

  • Incident Response Team Coordination. Consultants to help coordinate a response; specialists to stop the spread of an attack; forensic experts to analyze the attack’s scope, origin, and impact (to make sure the bad guys are really gone).
  • Legal and Regulatory Support. Experts to ensure you comply with industry-specific laws and regulations; assistance filing breach reports to regulators as required; legal teams to review third-party agreements and obligations.
  • Public Relations. PR specialists to write and disseminate statements to maintain customer trust and protect your brand; templates and strategies for notifying affected customers and others.
  • Ransom Negotiation. Specialists trained in handling ransomware demands, including safe negotiation, payment, and data retrieval.
  • Technical Assistance. Help in restoring systems, applications, and affected networks; guidance on addressing vulnerabilities that may have been exposed during the attack.
  • Post-Incident Support. Revising policies, educating staff, improving cybersecurity strategies to prevent future incidents.

#3. Get Back to Normal

Not surprisingly, a cyber attack is very disruptive. Everyone is excited and on alert; you may be in incident response mode for weeks (or longer). 

But when the active threat has been contained – granted, it is sometimes unclear when you have reached that point – you need to declare the incident “over” and move the team back to their regular jobs. That means ending the special meetings and rolling the incident process into standard follow-up. 

This doesn’t mean you stop paying attention. And of course, security weaknesses need to be fixed and extra staff training may be necessary. But resources are not infinite; you need to beware of overreacting by adding security for its own sake or taking your eye off the business of your business.

Continuing to operate in “attack-response mode” will burn out your staff, cause you to lose focus, and ultimately hurt revenue.

My hope is you never have to put any of these steps into action. But you never know, so preparation and smart response is key.

And Uncle Cliff, if somewhere, somehow, you are reading this, I just did 20 pushups in your honor.


Want to get great cybersecurity content delivered to your inbox? Click here to sign up for our monthly newsletter, Tales from the Click.

This article originally appeared on the Fractional CISO blog.

Cyber incidents can hit hard, but a solid plan makes all the difference! At Vendorapp , we’re all about staying prepared and protecting our users.

Like
Reply
John Czapko

Where Tech Meets Risk Strategy | CEO, CyberSecure | Redefining Cyber Insurance

8mo

A good IR plan should be tested throughout the year you nailed it Rob Black as always. Leveraging your insurers partners is a great often overlooked tip. It will save you time and money so follow this advice. Lots of nuggets here from Rob. Great info sir!!

Ratnala Preethi

Pre-Sales Executive @Baarez Technology Solutions

8mo

Excellent insights on the importance of incident preparedness, Great post! 

Drew Brown

Map it, build it, use it. Improve it NOTE: Posts, reposts, likes, and other actions on this account are endorsed by me and not any organization or entity associated with me.

8mo

First, I’m sorry for your loss my friend. I know that pain. Second, this is really good advice

Bill Frank

Improve cyber posture without increasing budget. Co-inventor of the patented Cyber Defense Graph™.

8mo

No doubt, tabletop exercises are important. You are more likely to get business leadership buy-in if the exercises are scoped by the loss events of concern to those leaders.

To view or add a comment, sign in

More articles by Rob Black

  • Will Artificial General Intelligence (AGI) Happen Soon?

    No. Wait, you were looking for an explanation? No problem! The Large Language Models (LLMs) that power today’s AI…

    6 Comments
  • The Certainty of Uncertainty

    Rachel and I had tickets last month to see the Goo Goo Dolls at Leader Bank Pavilion in the Boston Seaport. With the…

    5 Comments
  • Much Ado About Nothing

    We just got back recently from our annual family trip on the Cape. We had an amazing week of fun in the sun.

    4 Comments
  • Vendors on the Edge

    It was just after dinner last Sunday evening when my wife gave me the news: She was leaving me. So I did what any…

    5 Comments
  • The Fall of SOC 2

    I’ve been an Amazon customer since the late 90s, back when books were all they sold. Over the years, I have ordered…

    19 Comments
  • Know Your Audience

    Regular readers of this newsletter (thank you!) know I usually begin with a personal story – something in my life that…

    11 Comments
  • Do You Need a Cybersecurity Compliance Tool?

    I got an email the other day from QuickBooks, our accounting system provider. They were thanking me for our recent…

    12 Comments
  • Different Circumstances, Different Solutions

    “Don’t you have a snowblower? Why are you shoveling?” asked my friend, Larry. The answer, as I explained to him, is a…

    5 Comments
  • Cybersecurity Needs Your Attention

    December. That magical time of year when so many conversations turn to… … the pick and roll, great team defense, smart…

    3 Comments
  • Cybersecurity’s Unanticipated Benefits

    Longtime readers of this newsletter may assume that the only professionals I ever call to my house for assistance are…

    11 Comments

Others also viewed

Explore content categories