Your Data Breach CIRP: Plan Execution
Welcome to crisis. Remember all those theories about crisis that we discussed in Chapter 1? Here is where you either dominate them or they dominate you.
Remember that this is merely an example of what I crafted. You are free to organize your response in any manner that you and your organization deem to be most appropriate. The key is that your plan must empower you to take and maintain the initiative.
This chapter discusses the actual execution of your data breach plan. It will detail the ad hoc organization ...

Get The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.