SlideShare a Scribd company logo
WEBINAR
WEBINAR
Slide 3
Agenda
• Introductions
• Who Are We
• 2014: Year of the Breach
• Going Viral
• Facing the Crisis
• Questions
Slide 4
Introductions
• Ted Julian, CMO, Co3 Systems
• Melanie Dougherty Thomas, Managing Director, Inform
Slide 5
About Co3 – Incident Response Management
MITIGATE
Document Results &
Improve Performance
• Generate reports for management,
auditors, and authorities
• Conduct post-mortem
• Update SOPs
• Track evidence
• Evaluate historical performance
• Educate the organization
ASSESS
Identify and Evaluate Incidents
• Assign appropriate team members
• Evaluate precursors and indicators
• Correlate threat intelligence
• Track incidents, maintain logbook
• Prioritize activities based on criticality
• Generate assessment summaries
PREPARE
Improve Organizational Readiness
• Appoint team members
• Fine-tune response SOPs
• Escalate from existing systems
• Run simulations (firedrills / table tops)
MANAGE
Contain, Eradicate, and
Recover
• Generate real-time IR plan
• Coordinate team response
• Choose appropriate containment strategy
• Isolate and remediate cause
• Instruct evidence gathering and handling
• Log evidence
Slide 6
About Inform
• INFORM is a leader in Integrated Communications (IC).
• Inform provides high-level strategy and execution
incorporating public relations, marketing, innovative digital
and graphic design, video production, ad placement,
social and new media deployment, and crisis
management to meet your goals.
• The principles of the firm are leaders in the industry, with
nearly 20 years experience working in the
communications field. They have been employed by
Fortune 500 companies, been at the start-up table with
new ventures, and worked for agencies both large and
small.
Slide 7
2014: The Year of the Breach
“There are two kinds of companies in
America: those who’ve been breached and
those who don’t know they’ve been
breached.”
FBI Director James Comey
60 Minutes Interview
October 5, 2014
POLL
Slide 9
Attack of the Titans
• 43% of all companies in America have experienced a data
breach, USA Today, 9/24/14
• 80% of breaches root cause is employee negligence,
USA Today, 9/24/14
• 31.4 million people have had their protected health
information compromised following a breach, HHS,
10/26/14
Slide 10
Going Viral: Why a Data Breach Takes Flight
• Record setting loss
• Sensitive community affected
• Competitive media market
• Concentration of affected parties
• Delay in notification
• Customer complaints unanswered
• Failure to respond to social media
• Ignoring the media
• Mixed messages
Slide 11
Case Study: A leading consumer brand breach
blunder
1. Responding before a thorough assessment
2. Providing too much information too soon
3. Mixed messages=confusion
4. Retraction=uncertainty in messaging
5. Insensitivity to your market
6. Record-setting investment in brand rehabilitation
7. CIO & CEO lose positions, multiple class action suits in
the $100M, breach cost over $150M to date
8. Board of Directors target of lawsuits
POLL
Slide 13
Facing the Crisis: 9 Steps to Crisis
Communications Management – Active Incident
1. Internal planning happens before the crisis
2. Holding statement while forensics assessment is
conducted
3. Coordination with crisis team
4. Social media monitoring begins
5. Public statement-thoughtful, showing earnest
commitment to problem
6. Rapid notification/remediation, if required
7. Coordination across multiple communication mediums
8. Respond to every customer question in rapid fashion
9. Engage the press if approached
Slide 14
Collaboration is key
Risk &
Compliance
Legal-GC
& Firm
Forensics
Resolution
Provider
PR/
Crisis Communications
Client
POLL
Slide 16
The Path Forward: Specialist Required
Your Game Plan requires a crisis comms specialist who can stay abreast
of industry, legal & regulatory developments, & the court of public opinion.
Issue
Advertising
Community Relations
Campaign
Slide 17
Takeaways
• You can’t market your way out of a crisis & brand damage
• Your in-house team is likely not equipped to handle breach or
cybersecurity attack response (no matter how good they may
be)
• Coordination & planning is key
• Make the CEO the spokesperson, not legal or PR
• Public statement~ thoughtful, showing earnest commitment to
problem
• Regular crisis drills ensures response will be optimum
• Changing legal & regulatory landscape make data breach a
priority for the C-suite & Board of Directors
• Media & consumer awareness is growing rapidly~ they’re
informed & increasingly unforgiving
• Be prepared!
■
Slide 19
Upcoming Co3 Events
• You’ve Been Breached: How to Mitigate the Incident
Jan. 21, 2015, 12-1 pm EST
– Featuring Ted Julian, CMO, Co3 Systems and Stephen Brennan,
Global Technical Consulting Lead - Managing Partner, CSC
One Alewife Center, Suite 450
Cambridge, MA 02140
PHONE 617.206.3900
WWW.CO3SYS.COM
“Co3 Systems makes the process of planning for a
nightmare scenario as painless as possible,
making it an Editors’ Choice.”
PC MAGAZINE, EDITOR’S CHOICE
“One of the hottest products at RSA…”
NETWORK WORLD – FEBRUARY 2013
“Co3…defines what software packages for
privacy look like.”
GARTNER
“Platform is comprehensive, user friendly, and
very well designed.”
PONEMON INSTITUTE
Melanie Dougherty Thomas
Managing Director
Inform
http://informtheagency.com/
For a free consultation visit:
info.co3sys.com/free-consultation
Slide 21
“Co3 makes the process of planning for a
nightmare scenario as painless as possible,
making it an Editors’ Choice.”
– PC Magazine, Editor’s Choice
“Platform is comprehensive, user friendly,
and very well designed.”
– Ponemon Institute
“One of the most important
startups in security…”
– Business Insider
“One of the hottest products at RSA…”
– Network World
“...an invaluable weapon when
responding to security incidents.”
– Government Computer News
“Co3 has done better than a home-run...
it has knocked one out of the park.”
– SC Magazine
Most Innovative Product

More Related Content

PPTX
Co3's Annual Review & Predictions Webinar
PDF
Incident Response: How To Prepare
PPTX
By Popular Demand: Co3's Latest and Greatest Features
PPTX
You've Been Breached: How To Mitigate The Incident
PDF
Incident Response: Don't Mess It Up, Here's How To Get It Right
PDF
Craft Your Cyber Incident Response Plan (Before It's Too Late)
PDF
Dynamic Cyber Defense
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
Co3's Annual Review & Predictions Webinar
Incident Response: How To Prepare
By Popular Demand: Co3's Latest and Greatest Features
You've Been Breached: How To Mitigate The Incident
Incident Response: Don't Mess It Up, Here's How To Get It Right
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Dynamic Cyber Defense
Dealing with Information Security, Risk Management & Cyber Resilience

What's hot (20)

PDF
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
PDF
Incident Response
PDF
Achieving Compliance Through Security
PPTX
Incident Response in the age of Nation State Cyber Attacks
PDF
NESCO Town Hall Workforce Development Presentation
PDF
Building Human Intelligence – Pun Intended
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
PPTX
Tripwire Energy Working Group Session w/Dale Peterson
PDF
Incident Response
PDF
Integrating Cyber Security Alerts into the Operator Display
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Your cyber security webinar
PPTX
CRI Cyber Board Briefing
PPTX
Risk Management Approach to Cyber Security
PPTX
Bob West - Educating the Board of Directors
PPTX
Webinar: Be Cyber Smart – Stories from the Trenches
PPTX
Cyber Crime Threat Landscape - A Focus on the Financial Industry
PDF
Enumerating your shadow it attack surface
PDF
Keeping Your Data Clean
PPTX
Cyberwar Gets Personal
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
Incident Response
Achieving Compliance Through Security
Incident Response in the age of Nation State Cyber Attacks
NESCO Town Hall Workforce Development Presentation
Building Human Intelligence – Pun Intended
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Tripwire Energy Working Group Session w/Dale Peterson
Incident Response
Integrating Cyber Security Alerts into the Operator Display
Cybersecurity Roadmap Development for Executives
Your cyber security webinar
CRI Cyber Board Briefing
Risk Management Approach to Cyber Security
Bob West - Educating the Board of Directors
Webinar: Be Cyber Smart – Stories from the Trenches
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Enumerating your shadow it attack surface
Keeping Your Data Clean
Cyberwar Gets Personal
Ad

Viewers also liked (20)

PPTX
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
PPT
งานนำเสนอ1
DOC
Lilibeth-Caliwan-Parungao-resume
PPTX
Vintage ❋ Christmas
DOCX
Wanted & available
DOCX
Wanted & available
PDF
Hot tubs milwaukee
PPTX
The Target Breach - Follow The Money EU
PPTX
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
PDF
Riders app
PDF
Wedding decoration and favors
PDF
Looking Forward - Regulators and Data Incidents
PPTX
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
Cs160706 5
PPTX
Presentatie bloggen #mk12
PPTX
2012 Breach Lessons Learned - 2013 Do Differents
PPT
G77 training
PPT
Graphic Designing
PPTX
HIPAA – Where’s the Harm? Final Rule Update
PPTX
Nlp ile Başarının İç Oyunu
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
งานนำเสนอ1
Lilibeth-Caliwan-Parungao-resume
Vintage ❋ Christmas
Wanted & available
Wanted & available
Hot tubs milwaukee
The Target Breach - Follow The Money EU
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
Riders app
Wedding decoration and favors
Looking Forward - Regulators and Data Incidents
How To Turbo-Charge Incident Response With Threat Intelligence
Cs160706 5
Presentatie bloggen #mk12
2012 Breach Lessons Learned - 2013 Do Differents
G77 training
Graphic Designing
HIPAA – Where’s the Harm? Final Rule Update
Nlp ile Başarının İç Oyunu
Ad

Similar to Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat (20)

PPTX
How to Audit Your Incident Response Plan
PPTX
How to Build a Successful Incident Response Program
PDF
Are We Breached How to Effectively Assess and Manage Incidents
PDF
5 Steps to Improve Your Incident Response Plan
PDF
Crisis Management and Protecting Your Reputation
PDF
Treat a Breach Like a Customer, Not a Compliance Issue
PDF
Data analytics 2 analytics in the audit slides
PDF
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
PPT
IT Business Continuity Planning 2004
PPTX
Getting Started with Business Continuity
PPTX
Cyber Response and Planning for SMBs
PDF
Crisis management
PDF
Managing a crisis in the digital age
PPTX
How To Build An Incident Response Function
PPTX
Leveraging Your Security System to Impact Your Bottom line
PDF
Cybersecurity crisis management a prep guide
PDF
How To Stop Target-Like Breaches In Their Tracks
PDF
CHAPTER 5 -Information assurance management.pdf
PDF
Experion Data Breach Response Excerpts
PPTX
Deeper Security, Broader Privacy - how firms use the latest Co3 features to a...
How to Audit Your Incident Response Plan
How to Build a Successful Incident Response Program
Are We Breached How to Effectively Assess and Manage Incidents
5 Steps to Improve Your Incident Response Plan
Crisis Management and Protecting Your Reputation
Treat a Breach Like a Customer, Not a Compliance Issue
Data analytics 2 analytics in the audit slides
Fraud and Security in Uncharted Territory: Considerations in the Age of COVID-19
IT Business Continuity Planning 2004
Getting Started with Business Continuity
Cyber Response and Planning for SMBs
Crisis management
Managing a crisis in the digital age
How To Build An Incident Response Function
Leveraging Your Security System to Impact Your Bottom line
Cybersecurity crisis management a prep guide
How To Stop Target-Like Breaches In Their Tracks
CHAPTER 5 -Information assurance management.pdf
Experion Data Breach Response Excerpts
Deeper Security, Broader Privacy - how firms use the latest Co3 features to a...

More from Resilient Systems (15)

PDF
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
EU Cyber Attacks And The Incident Response Imperative
PDF
How To Turbo-Charge Incident Response With Threat Intelligence
PPTX
New CISO - The First 90 Days
PDF
The Target Breach – Follow The Money
PDF
A Breach Carol: 2013 Review, 2014 Predictions
PPTX
You're Breached: Information Risk Analysis for Today's Threat Landscape
PDF
Anatomy Of A Breach: The Good, The Bad & The Ugly
PPTX
The Patriot Act and Cloud Security - Busting the European FUD
PPTX
Incident Response: Security's Special Teams
PDF
SEC Cybersecurity Disclosure Guidelines
PDF
Breached! App Attacks, Application Protection and Incident Response
PDF
Introducing Co3's Security Incident Response Module
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Encryption: Who, What, When, Where, and Why It's Not a Panacea
Today's Breach Reality, The IR Imperative, And What You Can Do About It
EU Cyber Attacks And The Incident Response Imperative
How To Turbo-Charge Incident Response With Threat Intelligence
New CISO - The First 90 Days
The Target Breach – Follow The Money
A Breach Carol: 2013 Review, 2014 Predictions
You're Breached: Information Risk Analysis for Today's Threat Landscape
Anatomy Of A Breach: The Good, The Bad & The Ugly
The Patriot Act and Cloud Security - Busting the European FUD
Incident Response: Security's Special Teams
SEC Cybersecurity Disclosure Guidelines
Breached! App Attacks, Application Protection and Incident Response
Introducing Co3's Security Incident Response Module

Recently uploaded (20)

PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
DOC-20250806-WA0002._20250806_112011_0000.pdf
PDF
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
Digital Marketing & E-commerce Certificate Glossary.pdf.................
PPTX
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
PDF
Types of control:Qualitative vs Quantitative
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
PPTX
ICG2025_ICG 6th steering committee 30-8-24.pptx
PPTX
HR Introduction Slide (1).pptx on hr intro
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PPTX
Amazon (Business Studies) management studies
PPTX
5 Stages of group development guide.pptx
PPTX
Lecture (1)-Introduction.pptx business communication
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
A Brief Introduction About Julia Allison
PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PPT
Chapter four Project-Preparation material
Reconciliation AND MEMORANDUM RECONCILATION
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
DOC-20250806-WA0002._20250806_112011_0000.pdf
SIMNET Inc – 2023’s Most Trusted IT Services & Solution Provider
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
Digital Marketing & E-commerce Certificate Glossary.pdf.................
AI-assistance in Knowledge Collection and Curation supporting Safe and Sustai...
Types of control:Qualitative vs Quantitative
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
ICG2025_ICG 6th steering committee 30-8-24.pptx
HR Introduction Slide (1).pptx on hr intro
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Amazon (Business Studies) management studies
5 Stages of group development guide.pptx
Lecture (1)-Introduction.pptx business communication
Roadmap Map-digital Banking feature MB,IB,AB
Principles of Marketing, Industrial, Consumers,
A Brief Introduction About Julia Allison
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
Chapter four Project-Preparation material

Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat

  • 3. Slide 3 Agenda • Introductions • Who Are We • 2014: Year of the Breach • Going Viral • Facing the Crisis • Questions
  • 4. Slide 4 Introductions • Ted Julian, CMO, Co3 Systems • Melanie Dougherty Thomas, Managing Director, Inform
  • 5. Slide 5 About Co3 – Incident Response Management MITIGATE Document Results & Improve Performance • Generate reports for management, auditors, and authorities • Conduct post-mortem • Update SOPs • Track evidence • Evaluate historical performance • Educate the organization ASSESS Identify and Evaluate Incidents • Assign appropriate team members • Evaluate precursors and indicators • Correlate threat intelligence • Track incidents, maintain logbook • Prioritize activities based on criticality • Generate assessment summaries PREPARE Improve Organizational Readiness • Appoint team members • Fine-tune response SOPs • Escalate from existing systems • Run simulations (firedrills / table tops) MANAGE Contain, Eradicate, and Recover • Generate real-time IR plan • Coordinate team response • Choose appropriate containment strategy • Isolate and remediate cause • Instruct evidence gathering and handling • Log evidence
  • 6. Slide 6 About Inform • INFORM is a leader in Integrated Communications (IC). • Inform provides high-level strategy and execution incorporating public relations, marketing, innovative digital and graphic design, video production, ad placement, social and new media deployment, and crisis management to meet your goals. • The principles of the firm are leaders in the industry, with nearly 20 years experience working in the communications field. They have been employed by Fortune 500 companies, been at the start-up table with new ventures, and worked for agencies both large and small.
  • 7. Slide 7 2014: The Year of the Breach “There are two kinds of companies in America: those who’ve been breached and those who don’t know they’ve been breached.” FBI Director James Comey 60 Minutes Interview October 5, 2014
  • 9. Slide 9 Attack of the Titans • 43% of all companies in America have experienced a data breach, USA Today, 9/24/14 • 80% of breaches root cause is employee negligence, USA Today, 9/24/14 • 31.4 million people have had their protected health information compromised following a breach, HHS, 10/26/14
  • 10. Slide 10 Going Viral: Why a Data Breach Takes Flight • Record setting loss • Sensitive community affected • Competitive media market • Concentration of affected parties • Delay in notification • Customer complaints unanswered • Failure to respond to social media • Ignoring the media • Mixed messages
  • 11. Slide 11 Case Study: A leading consumer brand breach blunder 1. Responding before a thorough assessment 2. Providing too much information too soon 3. Mixed messages=confusion 4. Retraction=uncertainty in messaging 5. Insensitivity to your market 6. Record-setting investment in brand rehabilitation 7. CIO & CEO lose positions, multiple class action suits in the $100M, breach cost over $150M to date 8. Board of Directors target of lawsuits
  • 12. POLL
  • 13. Slide 13 Facing the Crisis: 9 Steps to Crisis Communications Management – Active Incident 1. Internal planning happens before the crisis 2. Holding statement while forensics assessment is conducted 3. Coordination with crisis team 4. Social media monitoring begins 5. Public statement-thoughtful, showing earnest commitment to problem 6. Rapid notification/remediation, if required 7. Coordination across multiple communication mediums 8. Respond to every customer question in rapid fashion 9. Engage the press if approached
  • 14. Slide 14 Collaboration is key Risk & Compliance Legal-GC & Firm Forensics Resolution Provider PR/ Crisis Communications Client
  • 15. POLL
  • 16. Slide 16 The Path Forward: Specialist Required Your Game Plan requires a crisis comms specialist who can stay abreast of industry, legal & regulatory developments, & the court of public opinion. Issue Advertising Community Relations Campaign
  • 17. Slide 17 Takeaways • You can’t market your way out of a crisis & brand damage • Your in-house team is likely not equipped to handle breach or cybersecurity attack response (no matter how good they may be) • Coordination & planning is key • Make the CEO the spokesperson, not legal or PR • Public statement~ thoughtful, showing earnest commitment to problem • Regular crisis drills ensures response will be optimum • Changing legal & regulatory landscape make data breach a priority for the C-suite & Board of Directors • Media & consumer awareness is growing rapidly~ they’re informed & increasingly unforgiving • Be prepared!
  • 18.
  • 19. Slide 19 Upcoming Co3 Events • You’ve Been Breached: How to Mitigate the Incident Jan. 21, 2015, 12-1 pm EST – Featuring Ted Julian, CMO, Co3 Systems and Stephen Brennan, Global Technical Consulting Lead - Managing Partner, CSC
  • 20. One Alewife Center, Suite 450 Cambridge, MA 02140 PHONE 617.206.3900 WWW.CO3SYS.COM “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” PC MAGAZINE, EDITOR’S CHOICE “One of the hottest products at RSA…” NETWORK WORLD – FEBRUARY 2013 “Co3…defines what software packages for privacy look like.” GARTNER “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Melanie Dougherty Thomas Managing Director Inform http://informtheagency.com/ For a free consultation visit: info.co3sys.com/free-consultation
  • 21. Slide 21 “Co3 makes the process of planning for a nightmare scenario as painless as possible, making it an Editors’ Choice.” – PC Magazine, Editor’s Choice “Platform is comprehensive, user friendly, and very well designed.” – Ponemon Institute “One of the most important startups in security…” – Business Insider “One of the hottest products at RSA…” – Network World “...an invaluable weapon when responding to security incidents.” – Government Computer News “Co3 has done better than a home-run... it has knocked one out of the park.” – SC Magazine Most Innovative Product