{"id":22856,"date":"2021-07-06T18:59:28","date_gmt":"2021-07-06T18:59:28","guid":{"rendered":"https:\/\/cyberleadershipinstitute.com\/?page_id=22856"},"modified":"2023-01-29T10:42:14","modified_gmt":"2023-01-29T10:42:14","slug":"master-your-security-incident-response-communications-program-2","status":"publish","type":"page","link":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/","title":{"rendered":"Master Your Security Incident Response Communications Program"},"content":{"rendered":"

Master Your Security Incident Response Communications Program<\/strong><\/h1>\n

Prepare to maintain the trust and confidence of your stakeholders when things go wrong.<\/span><\/p>\n

If you’re already a member, click here<\/a> to log in.<\/p>\n

Major Business Pain Points<\/strong><\/h2>\n
    \n
  • When a significant security incident is discovered, usually very few details are known for certain. Nevertheless, the organization will need to say something to affected stakeholders.<\/span><\/span><\/span><\/span><\/li>\n
  • Security incidents tend to be ongoing situations that last considerably longer than other types of crises, making communications a process rather than a one-time event.<\/span><\/span><\/span><\/span><\/li>\n
  • Effective incident response communications require collaboration from: IT, Legal, PR, and HR \u2013 groups that often speak \u201cdifferent languages.\u201d<\/span><\/li>\n<\/ul>\n

    \"Master<\/span><\/p>\n

    Recommendations<\/strong><\/h2>\n

    Key Points<\/strong><\/em><\/h3>\n
      \n
    • There\u2019s no such thing as successful<\/em> incident response communications; strive instead for effective<\/em> communications. There will always be some fallout after a security incident, but it can be effectively mitigated through honesty, transparency, and accountability.<\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n
    • Effective external communications begin with effective internal communications. Security Incident Response Team members come from departments that don\u2019t usually work closely with each other. This means they often have different ways of thinking and speaking about issues. Be sure they are familiar with each other before a crisis occurs.<\/span><\/span><\/span><\/span><\/span><\/li>\n
    • You won\u2019t save face by withholding embarrassing details. Lying only makes a bad situation worse, but coming clean and acknowledging shortcomings (and how you\u2019ve fixed them) can go a long way towards restoring stakeholders\u2019 trust.<\/span><\/li>\n<\/ul>\n

      \"Master<\/span><\/p>\n

      Approach<\/strong><\/em><\/h3>\n
        \n
      • Effective and efficient management of security incidents involves a formal process of preparation, detection, analysis, containment, eradication, recovery, and post-incident activities: communications must be integrated into each of these phases.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n
      • Understand that prior planning helps to take the guesswork out of incident response communications. By preparing for several different types of security incidents, the communications team will get used to working with each other, as well as learning what strategies are and are not effective. Remember, the communications team contains diverse members from various departments, and each may have different ideas about what information is important to release.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n

        Methodology and Tools<\/strong><\/h2>\n

        Executive Brief<\/strong><\/h3>\n

        Read the concise Executive Brief to find out why you should implement a security incident response communications plan and review the methodology.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

          \n
        • Master Your Security Incident Response Communications Program \u2013 Executive Brief<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
        • Master Your Security Incident Response Communications Program \u2013 Phases 1-2<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

          1. Dive into communications planning<\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

          This phase addresses the benefits and challenges of incident response communications and offers advice on how to assemble a communications team and develop a threat escalation protocol.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

            \n
          • Master Your Security Incident Response Communications Program \u2013 Phase 1: Dive into Communications Planning<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
          • Security Incident Management Plan<\/span><\/span><\/span><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

            2. Develop your communications plan<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/h3>\n

            This phase focuses on creating an internal and external communications plan, managing incident fallout, and conducting a post-incident review.<\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/p>\n

              \n
            • Master Your Security Incident Response Communications Program \u2013 Phase 2: Develop Your Communications Plan<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Security Incident Response Interdepartmental Communications Template<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Security Incident Communications Policy Template<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Security Incident Communications Guidelines and Templates<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Security Incident Metrics Tool<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n
            • Tabletop Exercises Package<\/span><\/span><\/span><\/strong><\/strong><\/span><\/span><\/span><\/span><\/span><\/span><\/strong><\/span><\/li>\n<\/ul>\n

              All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.<\/p>\n","protected":false},"excerpt":{"rendered":"

              Master Your Security Incident Response Communications Program Prepare to maintain the trust and confidence of your stakeholders when things go […]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"acf":[],"yoast_head":"\nMaster Your Security Incident Response Communications Program - Cyber Leadership Institute<\/title>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Discover and Classify Your Data\" \/>\n<meta property=\"og:description\" content=\"Provide your data with the protection it deserves.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Leadership Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/cyberleadershipinstitute\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-29T10:42:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Discover-and-Classify-Your-Data.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Master Your Security Incident Response Communications Program\" \/>\n<meta name=\"twitter:description\" content=\"Master Your Security Incident Response Communications ProgramPrepare to maintain the trust and confidence of your stakeholders when things go wrong.If\" \/>\n<meta name=\"twitter:site\" content=\"@C_L_Institute\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/\",\"name\":\"Master Your Security Incident Response Communications Program - Cyber Leadership Institute\",\"isPartOf\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"datePublished\":\"2021-07-06T18:59:28+00:00\",\"dateModified\":\"2023-01-29T10:42:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg\",\"width\":2400,\"height\":1274},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cyberleadershipinstitute.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Master Your Security Incident Response Communications Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#website\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"name\":\"Cyber Leadership Institute\",\"description\":\"Know You're Ready\",\"publisher\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#organization\",\"name\":\"Cyber Leadership Institute\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"contentUrl\":\"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg\",\"width\":512,\"height\":512,\"caption\":\"Cyber Leadership Institute\"},\"image\":{\"@id\":\"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/cyberleadershipinstitute\",\"https:\/\/x.com\/C_L_Institute\",\"https:\/\/www.instagram.com\/cyber_leadership_institute\/\",\"https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Master Your Security Incident Response Communications Program - Cyber Leadership Institute","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"en_US","og_type":"article","og_title":"Discover and Classify Your Data","og_description":"Provide your data with the protection it deserves.","og_url":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/","og_site_name":"Cyber Leadership Institute","article_publisher":"https:\/\/facebook.com\/cyberleadershipinstitute","article_modified_time":"2023-01-29T10:42:14+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Discover-and-Classify-Your-Data.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_title":"Master Your Security Incident Response Communications Program","twitter_description":"Master Your Security Incident Response Communications ProgramPrepare to maintain the trust and confidence of your stakeholders when things go wrong.If","twitter_site":"@C_L_Institute","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/","url":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/","name":"Master Your Security Incident Response Communications Program - Cyber Leadership Institute","isPartOf":{"@id":"https:\/\/cyberleadershipinstitute.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage"},"thumbnailUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","datePublished":"2021-07-06T18:59:28+00:00","dateModified":"2023-01-29T10:42:14+00:00","breadcrumb":{"@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#primaryimage","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/Pain-Points.jpg","width":2400,"height":1274},{"@type":"BreadcrumbList","@id":"https:\/\/cyberleadershipinstitute.com\/master-your-security-incident-response-communications-program-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cyberleadershipinstitute.com\/"},{"@type":"ListItem","position":2,"name":"Master Your Security Incident Response Communications Program"}]},{"@type":"WebSite","@id":"https:\/\/cyberleadershipinstitute.com\/#website","url":"https:\/\/cyberleadershipinstitute.com\/","name":"Cyber Leadership Institute","description":"Know You're Ready","publisher":{"@id":"https:\/\/cyberleadershipinstitute.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberleadershipinstitute.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cyberleadershipinstitute.com\/#organization","name":"Cyber Leadership Institute","url":"https:\/\/cyberleadershipinstitute.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/","url":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","contentUrl":"https:\/\/cyberleadershipinstitute.com\/wp-content\/uploads\/2021\/03\/cropped-CLI-Favicon.jpg","width":512,"height":512,"caption":"Cyber Leadership Institute"},"image":{"@id":"https:\/\/cyberleadershipinstitute.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/cyberleadershipinstitute","https:\/\/x.com\/C_L_Institute","https:\/\/www.instagram.com\/cyber_leadership_institute\/","https:\/\/www.linkedin.com\/school\/cyberleadershipinstitute\/"]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"authorship-box-avatar":false,"authorship-box-related":false},"uagb_author_info":{"display_name":"nomel ojidrev","author_link":"https:\/\/cyberleadershipinstitute.com\/author\/lem\/"},"uagb_comment_info":0,"uagb_excerpt":"Master Your Security Incident Response Communications Program Prepare to maintain the trust and confidence of your stakeholders when things go […]","_links":{"self":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/22856"}],"collection":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/comments?post=22856"}],"version-history":[{"count":6,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/22856\/revisions"}],"predecessor-version":[{"id":35307,"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/pages\/22856\/revisions\/35307"}],"wp:attachment":[{"href":"https:\/\/cyberleadershipinstitute.com\/wp-json\/wp\/v2\/media?parent=22856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}