Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » Why Communication Is Key in a Security Breach Investigation
Cybersecurity

Why Communication Is Key in a Security Breach Investigation

Frank DomizioBy Frank DomizioDecember 2, 2022Updated:December 3, 20224 Mins Read
Facebook Twitter LinkedIn Email
communication breach investigation
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

After you’ve discovered a breach, your IT (information technology) security department will be a flurry of activity. Most will center around the technical work that needs to happen to answer questions like: “How did this happen?” “What data was lost?” and “How do we fix it?” While your responders are getting you the answers, you’re going to want to know what’s going on. That’s sometimes easier said than done, so you’ll need a good internal communications strategy going in. Here are a few essential areas of focus:

Keep the Incident Responders on Task

As we have talked about in previous articles, this will be a stressful time for you. No matter if you are the business owner, CEO, or IT head, you will have a strong desire for up-to-the-second information so you can keep your bosses, boards of directors, shareholders, and yourself informed. But resist the urge for hourly updates. You can have your responders examining malware and analyzing packet captures (PCAPs), or you can have them writing updates, but you can’t have them doing both. I’d say you want them working to answer the most important questions.

Designate Who Will Be the Incident Coordinator

I suggest naming an incident coordinator. This person will be the source of information about the investigation. They will be who you call when you have questions, and they will be the person delivering your briefings and updates. More importantly, the incident coordinator will be a buffer between the outside world and your technical incident responders. It will be their job to field and triage requests for information and make sure the team is getting you the answers that you require.

There are several important qualities that you’ll want to look for in an incident coordinator. You’re going to want someone who can translate complex technical issues into language that the non-technical crowd can understand. A jargon-free, no-acronym experience is something that will make your life a lot easier.

You are also going to look for someone who has some writing skills. You do not need to find Hemingway’s incident-responder cousin, but you will want someone who can write in complete sentences, use punctuation, and generally make sense. You do not want to be on the hook for correcting those types of issues before you forward your update to whoever may need to see it in your organization’s chain of command.

Finally, this individual should also be someone with a firm, tactful hand. As we talked about above, this person will need to run interference for your team. They will need to turn away people so that the team can continue working. “People” may very well be you or your bosses, and you’ll want your coordinator to be firm and persuasive.

Agree on an Update Schedule

Since every breach is different, you’ll want to work out an update schedule with your incident coordinator. There is a modicum of comfort in being able to look at the time and know when you’ll have information coming in. During the first few hours of an investigation, you may want updates as often as every four to six hours. After the initial deluge of information that comes in at the beginning of most investigations, you will probably want to change that cadence to once per day. Then, as things move forward, you’ll want to consider adjusting every other day or even less often than that. You do not want your team or your coordinator sitting around trying to come up with stuff to say so they don’t have to report “no updates at this time.” And they will do that. I have done it. It is a complete waste of their time writing it and of your time reading it. Don’t fall into the trap.

Final Thoughts

Communication is an important part of a breach investigation. If your team is making discoveries and finding out key information, and you’re not receiving that data, or you can’t understand it, the long days that come with a response to an incident will seem that much longer. Get the right people, set the ground rules, stay informed, and you’ll successfully navigate your breach response.

click here to join the conversation on linkedin

Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

data featured security security teams
Share. Facebook Twitter LinkedIn Email
Frank Domizio
  • LinkedIn

Frank Domizio is an Acceleration Economy Analyst focusing on Cybersecurity. As a retired Philadelphia Police Officer, Frank got his start in cybersecurity while he was detailed to the FBI as a digital forensic examiner. Since then, Frank has held many positions in and around the federal government specializing in Cyber Threat Intelligence and Incident Response. Now, as a Federal Civilian for an Executive Branch Agency, Frank is a student of the strategy and leadership that goes into making a successful cybersecurity program. He is also an adjunct professor of cybersecurity at the University of Maryland Global Campus. Frank holds a Bachelor of Science in Computing Security Technology from Drexel University and a Master of Science in Cyber and Information Security from Capitol College as well as many industry certifications. As a Federal Government Employee Frank’s views are his own, not representing that of the U.S. Government or any agency.

Related Posts

Google Launches Unified MCP Support Across Its Services

December 23, 2025

Microsoft Fills in Agent 365 Management, Governance Details Through New Public Demos

December 23, 2025

AI Agent & Copilot Podcast: Microsoft’s Grant Dess Provides AI Agent & Copilot Summit Insights

December 23, 2025

AI-Enhanced Security: ServiceNow’s Bold Move with Armis

December 23, 2025
Add A Comment

Comments are closed.

Recent Posts
  • Google Launches Unified MCP Support Across Its Services
  • Microsoft Fills in Agent 365 Management, Governance Details Through New Public Demos
  • AI Agent & Copilot Podcast: Microsoft’s Grant Dess Provides AI Agent & Copilot Summit Insights
  • AI-Enhanced Security: ServiceNow’s Bold Move with Armis
  • The Agentic Enterprise Arrives: Microsoft’s Copilot and Agent Breakthroughs of 2025

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks and Reports

The Agentic Enterprise: How Microsoft and Industry Leaders Are Redefining Work Through AI

September 2, 2025

SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains

July 10, 2025

Using Agents and Copilots In M365 Modern Work

March 11, 2025

AI Data Readiness and Modernization: Tech and Organizational Strategies to Optimize Data For AI Use Cases

February 21, 2025

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2026 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.
body::-webkit-scrollbar { width: 7px; } body::-webkit-scrollbar-track { border-radius: 10px; background: #f0f0f0; } body::-webkit-scrollbar-thumb { border-radius: 50px; background: #dfdbdb }