4. Thoroughly review your incident response plans
Organizations must have designated individuals and formal procedures in place to determine the “significant impact” of an incident and contact the appropriate authorities by specified deadlines.
Testing and preparedness of incident response plans will be critical. Sometimes when groups are assembled from a diverse set (legal, IT, finance, external companies, etc.), but are not used to working together, then this can cause unnecessary confusion during mitigation efforts.
5. Get back to basics
In cybersecurity, it’s always wise to get the basics right. Understand what trespassing means. If you are a public company, there should already be legal and business teams that are fully familiar with the concept of materiality and have the experience to apply it in other situations. Learn from them. Examine any oversight structures in place at board and management level and determine if any improvements are needed. For example, giving adequate space for security discussion on the board agenda or appointing a dedicated committee for cyber security.
Source link