Data breaches have become more frequent and costly than ever. In 2021, the average data breach cost companies more than $4 million. Threat actors are increasingly likely to be sophisticated. The emergence of ransomware-as-a-service (RaaS) has allowed even unsophisticated, inexperienced parties to execute harmful, disruptive, costly attacks. In this atmosphere, what can businesses do to best prepare for a cybersecurity incident?
One fundamental aspect of preparation is to develop a cyber incident response plan (IRP). The National Institute of Standards and Technology (NIST) identified five basic cybersecurity functions to manage cybersecurity risk:
- Identify
- Protect
- Detect
- Respond
- Recover
In the NIST framework, anticipatory response planning is considered part of the “respond” function, indicating how integral proper planning is to an effective response. Indeed, NIST notes that “investments in planning and exercises support timely response and recovery actions, resulting in reduced impact to the delivery of services.”
But what makes an effective IRP? And what else goes into quality response planning?
A proper IRP requires several considerations. The primary elements include:
- Assigning accountability: identify an incident response team
- Securing assistance: identify key external vendors including forensic, legal and insurance
- Introducing predictability: standardize crucial response, remediation and recovery steps
- Creating readiness: identify legal obligations and information to facilitate the company’s fulfillment of those obligations
- Mandating experience: develop periodic training, testing and review requirements
After developing an IRP, a business must ensure it remains current and effective through regular reviews at least annually or anytime the business undergoes a material change that could alter either the IRP’s operation or the cohesion of the incident response team leading those operations.
An effective IRP is one of several integrated tools that can strengthen your business’s data security prior to an attack, facilitate an effective response to any attack, speed your company’s recovery from an attack and help shield it from legal exposure in the event of follow-on litigation.
© 2024 Varnum LLP by: John J. Rolecki of Varnum LLP For more on Cybersecurity, visit the NLR Communications Media Internet section.