Attacks/Breaches

4/5/2018
03:00 PM
50%
50%

How to Build a Cybersecurity Incident Response Plan

Being hit by a cyberattack is going to be painful. But it can be less painful if you're prepared, and these best practices can help.

When it comes to corporate cyber incidents, there's no debating the facts: attacks are more sophisticated, frequent, widespread, and costly than ever. In 2015, cybercrime cost companies $3 trillion. By 2021, that number is expected to double. At that point, cybercrime will become the most profitable criminal enterprise in the world.

Smart business leaders understand a cyberattack isn't a possibility — it's an inevitability. And yet, even in a climate of awareness about the threats posed by cybercrime, businesses aren't doing enough to prepare for these incidents.

Having a well-protected corporate infrastructure with the requisite safeguards is vital —  and not just in technology but in the people and processes, too. What happens when attackers breach these defenses? How do companies handle an incident and its fallout? When every second counts, previous preparation increases the speed at which organizations can respond, avoiding hastily made decisions because the pros and cons already have been weighed. Preparation also cuts through the paralysis that can come with such an event.   

Mistakes to Avoid
Given the sheer volume of breaches that have hit enterprises of all sizes and industries, it's easy to find notable examples of less-than-stellar corporate responses. Case in point: Equifax. After the credit monitoring firm experienced the largest cyberattack to date, it wasn't the breach itself that drove headlines; it was the company's disorganized and problematic response, which began by directing potential victims to a bug-ridden site and continued with the company repeatedly tweeting out phishing links after the breach had occurred. 

Here are a few of Equifax's mistakes from which we can learn.

Too much time spent in denial. Once an incident is detected, every second counts. Yet too many enterprises fall into the denial trap, where they either overlook anomalous activity or downplay the magnitude of the activity once discovered. This state of denial almost always backfires by fracturing customer and employee trust — and losing precious time — as it did in Equifax's case.

Unstructured chain of command. Getting hacked can be a source of embarrassment for enterprises. But companies that project competence, organization, and control in the wake of an attack can positively affect its future. The blunders described above in Equifax's case pointed to a lack of structure within the enterprise.

Lack of foresight. Alongside an absence of a chain of command comes a lack of foresight, which can manifest in companies acting too hastily, overcorrecting, or implementing "fixes" that create new problems. No, you cannot predict the future or the decisions that will need to be made. But you can agree ahead of time on the process for making those decisions and who is going to make them. When you do this, you minimize the influence of emotion and personality differences that can derail a cyber response in an instant.

Incident Response Plan Best Practices
For enterprises, having a comprehensive and strategically designed cybersecurity incident response plan is the single most important step to mitigate the fallout of a malicious intrusion. These are the best practices for designing, testing, and implementing such a plan.

Secure participation from key stakeholders. A security breach affects many groups within an organization. As a result, cross-departmental support and buy-in is needed during the ideation and development phase. Human resource leaders, compliance officers, legal representatives, external vendors such as technology providers and public relations firms, and management liaisons all need a seat at the table.

Delineate roles. Once you have key stakeholders in the room, it's important to clearly layout their specific responsibilities in the event of a breach. Perhaps HR leaders are on point for internal communications when a breach happens, while the PR team handles external communications. At the same time, legal representatives should be ready for any regulatory implications of a breach, while IT experts should familiarize themselves with the back-end work they'll need to handle. Specifying these roles in advance of a breach prevents the kind of high-level confusion that ensued in the wake of the Equifax incidents.

Run tabletop exercises. As companies flesh out an incident response plan, the true litmus test is a breach simulation. The best way to conduct this exercise is with a third party, since that eliminates the possibility of bias in designing the mock attack. In terms of tabletop objectives, the goal should be to validate that your plan considers all actions and activities that need to occur during a breach. It can also validate whether each function understands their role and more importantly reveal how various personalities may affect the breach response.

Communicate effectively. When a cybersecurity incident occurs, chaos is inevitable with multiple workstreams, competing priorities, and the number of people involved. The investigation aspect is only one part to the response, competing with executive briefings, legal notification, HR, regulatory concerns, and public relations, to name a few. It is imperative for companies to understand how to communicate effectively amid the chaos. Companies should create a viable incident response plan that touches every part of the organization and then communicate the plan —  in a simple and digestible way —  to all employees.     

When it comes to cyberattacks on companies, there are two parts: the incident and the response. Companies often cannot always control the former, but they have significant control over the latter. By designing and implementing incident response plans that are cross-departmental, carefully designed, and endorsed by all key stakeholders, companies can strengthen public trust and brand reputation in a situation that could otherwise be ruinous.

Related Content:

Interop ITX 2018

Join Dark Reading LIVE for two cybersecurity summits at Interop ITX. Learn from the industry's most knowledgeable IT security experts. Check out the Interop ITX 2018 agenda here.

Wayne Lee is a Senior Architect with West Monroe Partners, responsible for the firm's cybersecurity practice on the West Coast. He is a proven information security leader with nearly two decades of experience providing strategic and tactical cybersecurity expertise to ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
6 Reasons Why Employees Violate Security Policies
Ericka Chickowski, Contributing Writer, Dark Reading,  10/16/2018
Getting Up to Speed with "Always-On SSL"
Tim Callan, Senior Fellow, Comodo CA,  10/18/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: Too funny!
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.