January 7, 2016 By Kevin Beaver 2 min read

What’s your plan for when that inevitable network event or, worse, that data breach occurs? Is it to figure things out as you go or is it to plan things out in advance to the best of your abilities before the going gets rough?

As management consultant Peter Drucker once said, the only thing that’s inevitable in the life of the leader is the crisis. Once a security incident or confirmed breach unfolds, you’re in the spotlight. It’s your testing time to see what you’re really made of. Why not start working on making yourself look good today?

Early on in my career, I learned a highly valuable lesson for IT and security problem-solving from René Descartes, the French philosopher. He said, “Divide each difficulty into as many parts as is feasible and necessary to resolve it.” The mark of a true leader, including those responsible for day-to-day information security oversight, is not to place blame but instead to ask good questions — many of which are hardly ever thought about.

Approaching the Data Breach Problem

Applying this to security incidents and data breaches, you can step back and take a look at the bigger picture of what’s going on and what it’s going to take to resolve the challenge by asking the following questions:

  • What has actually happened?
  • How did it happen?
  • What was impacted?
  • Who/what information was involved?
  • Who else needs to be on the response team?
  • What are the next steps?

The reality is no one really cares about how great your security program is (or was); they only care about the breach that just occurred. This is why you have to focus on fast and effective response. Treat data breaches as you would any other important business project. It’s not going to be resolved immediately. Rather, it will have an ongoing life cycle.

Answering the Key Questions

I suspect that in many, if not most, data breach situations, these questions have gone unanswered or the information is not made available when it needs to be (e.g., during and immediately after the event). Then the very things that led up to the event create the same breach scenario again down the road.

Remember the universal law that says you cannot change facts, but you can change problems. You cannot change the breach that occurred, but you can change the factors that led to it and the problems that are currently in the way of you reaching a successful resolution.

Bad things happen less often to people who are prepared. You don’t have to accept this core security challenge as the new normal. Get ready. That’s the secret to success.

Figure out what the worst thing is that could happen, do everything within reason to make sure that it doesn’t happen and then have a plan to minimize the impact of any residual risks. It’s really as simple as that.

More from Risk Management

What’s behind unchecked CVE proliferation, and what to do about it

4 min read - The volume of Common Vulnerabilities and Exposures (CVEs) has reached staggering levels, placing immense pressure on organizations' cyber defenses. According to SecurityScorecard, there were 29,000 vulnerabilities recorded in 2023, and by mid-2024, nearly 27,500 had already been identified.Meanwhile, Coalition's 2024 Cyber Threat Index forecasts that the total number of CVEs for 2024 will hit 34,888—a 25% increase compared to the previous year. This upward trend presents a significant challenge for organizations trying to manage vulnerabilities and mitigate potential exploits.What’s behind…

Addressing growing concerns about cybersecurity in manufacturing

4 min read - Manufacturing has become increasingly reliant on modern technology, including industrial control systems (ICS), Internet of Things (IoT) devices and operational technology (OT). While these innovations boost productivity and streamline operations, they’ve vastly expanded the cyberattack surface.According to the 2024 IBM Cost of a Data Breach report, the average total cost of a data breach in the industrial sector was $5.56 million. This reflects an 18% increase for the sector compared to 2023.Apparently, the data being stored in industrial control systems is…

Cybersecurity Awareness Month: Horror stories

4 min read - When it comes to cybersecurity, the question is when, not if, an organization will suffer a cyber incident. Even the most sophisticated security tools can’t withstand the biggest threat: human behavior.October is Cybersecurity Awareness Month, the time of year when we celebrate all things scary. So it seemed appropriate to ask cybersecurity professionals to share some of their most memorable and haunting cyber incidents. (Names and companies are anonymous to avoid any negative impact. Suffering a cyber incident is bad…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today