Privacy and Data Protection

Keys to Successful Incident Response

There are multiple tasks that must be accomplished when responding to cyber incidents and data breaches. Complying with regulations while also protecting both the organization and potential victims of an incident requires careful planning. The recommendations below can be broken down into four categories: Discover, Analyze, Mitigate, and Respond. Note that these should not be considered as steps to be taken in consecutive order, as many of these tasks will need to be accomplished simultaneously in order to meet breach notification requirements.

This document is only available to subscribers. Please log in or purchase access.