Use your computer fearlessly.




Mission Services Articles Research





business: breach

business: response: Rapid Response, Part 1, Part 2: Response, Part 3: Coordination, Part 4: Strategy, Part 5: Recovery, Part 6: Investigation, Part 7: Evolution


Rapid Response to Breach, Part 1

by Brent Kirkpatrick

(Date Published: .)



Your response to a security breach should rapidly involve the whole organization.



Intrepid Net Computing will be doing a series on rapid response. Numerous companies have been breached: Equifax, Forever21, Delloitte, Merck, Pizza Hut, etc.

We will consider the following questions: Who to involve in the response? How to coordinate? What strategic moves to consider? How to recover? When to investigate?

Response to a breach involves people, process and technology, your whole organization. Getting your PR and legal people involved early prevents siloing of the response in the technical realm.


defendIT. AI-driven security measures derived from security incident data.


Business Articles:

Rapid Response, Part 1
Part 2: Response
Part 3: Coordination
Part 4: Strategy
Part 5: Recovery
Part 6: Investigation
Part 7: Evolution

Cascading Data Breaches
Incident Response Plan
Why Clean-Up Hacking?
Rapid Containment of Intrusions













What Is New? | Contact | Tips


© 2015, 2016, 2017, 2018 Intrepid Net Computing. All rights reserved.