Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » How to Prioritize Cybersecurity Incident Response Teams When Breached
Cybersecurity

How to Prioritize Cybersecurity Incident Response Teams When Breached

Frank DomizioBy Frank DomizioNovember 28, 2022Updated:November 28, 20225 Mins Read
Facebook Twitter LinkedIn Email
security incident response team
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

In the initial hours after a breach, you’ll quickly realize that you need help — legal help, PR help, budgetary help, and definitely help from an experienced incident responder. Typically, that support will come from either an in-house team or an outside, third-party incident response team.

In this analysis, I’m going to lay out the differences between the two approaches, and their relative strengths and weaknesses.

Having Your Own Team

First and foremost, you may have those experienced incident responders in-house on your own information technology (IT) security team. If you do have a dedicated incident response team, consider yourself lucky: The people on the team are familiar with your environment and tools, have relationships with other IT people and staff across your business, and have in-depth knowledge and experience that cannot be replicated by someone from the outside.

However, even if you do find yourself in this fortunate sceario, don’t expect it all to be sunshine and rainbows. Unless you are working in a very large organization, chances are that your incident response staff comprises only a few people. If you have experienced a breach, this team will be stretched to its limit. Its members may be trained to find a needle in a haystack, but after multiple days, weeks, and months of long hours, even the best of us will be challenged to sustain our best work and maximum focus.

How to Help Your In-House Team

So how do you help them? First, make sure they are honing their craft regularly. IT is forever changing and the time to learn the latest tech is not the day of the breach. Allow them to run exercises; send them to training and conferences; set up a capture-the-flag event; and do anything else you can do to sharpen the knife.

Secondly, make sure they are getting enough time away from work to care for themselves and their families. Many incident responders will do their best impression of a labrador during duck season: They go until they literally fall down, then get up and go some more. Send them home, order pizzas, and make sure the coffee is fresh. Having a well-rested (and respected) team will show in the results of its investigation, and you’ll be happy that you took care of everyone working on it.

Finally, make sure they have the tools to perform the requisite tasks. Not all tools are created equal. Can your team create a forensic image using some commandlinefu? Sure. Are there commercial tools on the market that will perform that job in a much shorter time? Absolutely! During a protracted investigation, precious time can be saved by making sure the team has the right tools for the job.

Working With a Third-Party Team

Alternatively, if you do not have an in-house team, you’ll need to contract with a third party to perform your investigation. This approach has some strong benefits. Incident response is what these teams do. They go from one large breach to the next, so the team members’ skills and processes are sharp. You won’t need to worry about training and tools (these professionals will come with their own), but there are some other considerations you should think through.

One is that your third-party team is showing up cold. Its members don’t have relationships and trust built with your existing staff. Someone will need to help these people to get the lay of the land. They’ll likely need to know: Where can I work? Who do I talk to about permissions issues? How do I get firewall rules changed? Where is the nearest pizza place? (If you haven’t noticed, pizza is an important part of responding to an incident.)

Another consideration is that professional incident responders are expensive. That is not to say that they aren’t worth it, but you will want to focus them squarely on the work that only they are qualified to do. Imaging and hashing disks, copying packet captures (PCAPs), and picking up infected machines from employees’ desks are all examples of things that need to be accomplished, but which you can have junior IT staff do to keep your highly talented and expensive incident responders on task. This has the added bonus of getting your IT team some experience working in and around security.

You’re also going to make sure you shop around for a company that you trust before an incident occurs. What are the qualifications of the people they’ll send? How long will it take them to spin up after they are activated? What will they do with the data that is derived from the investigation? All these things need to be figured out before work can begin. I cannot emphasize enough, this will be a personally and professionally stressful time. Decisions will need to be made often and quickly. Anything that you can button up beforehand is worth your time investment.

Final Thoughts

No matter which kind of incident response team you’re dealing with, trust is a key factor. As a business leader, you’ll want to trust the information and advice coming from your team. At the same time, you’ll want the team to feel comfortable enough with you to speak the hard truths that are sure to come. Following the steps outlined above will help you establish a relationship with your team to allow a free flow of communications and help you to feel confident that you’ll make it through this trying time.

CLick here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

breach Cyber Attack Cybersecurity data privacy featured security teams
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications

May 12, 2025

How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation

May 12, 2025

Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD

May 12, 2025

Microsoft Adopts A2A Protocol, Agentic AI Era Begins

May 9, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Apps Apocalypse: Bill McDermott Joins Satya Nadella in Saying AI Agents Will Crush Applications
  • How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation
  • Bill McDermott Channels Satya Nadella: AI Agents Will Turn Apps Into CRUD
  • Microsoft Adopts A2A Protocol, Agentic AI Era Begins
  • AI Agent & Copilot Podcast: Finastra Chief AI Officer Lays Out Range of Use Cases, Microsoft Collaboration

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.