How to internally respond after a breach
There is no such thing as 100% secure. Frustrating for security professionals, but a fact of life as it’s now not about if but about when. You will already be busy driving your risk-based approach to security, closing and shutting as many doors and windows into the organization, driving best practice in cyber hygiene and running best practice on your monitoring and detecting. However, in an era where every company is liable to get hit with a data breach, you also need a rock-solid plan. One that, should the worse happen, will ensure that your public and internal response douses the fire, not inflame it further.
To find out about Nik Whitfield’s recommended practices for responding after a data breach, you can read the full Cyber Defense Magazine article here.