Page 334 - Cyber Defense eMagazine September 2025
P. 334

consistently struggle with fragmented communications and limited visibility -- issues that inflate incident
            timelines.

            The current IR crisis starts with the way plans are designed and executed. You’d be shocked at how
            many static documents or spreadsheets I’ve seen companies try to pass off as an IR plan. These are
            documents  that  don’t  integrate  into actual  workflows.  These  files  will  sit  on  a server  and  will  help a
            company  pass  audits,  but  that’s  about  the  extent  of  their  utility.  They’re  not  doing  much  to  support
            response teams in the moment. In real-world incidents, teams need more than just a set of instructions.

            They need a dynamic, shared environment where work is tracked in real-time, responsibilities are clearly
            defined, and progress is visible across the organization. Without that as a baseline, efforts will inevitably
            become siloed and inconsistent at best (and counterproductive at worst). When the left hand doesn’t
            know what the right hand is doing, critical tasks will fall through the cracks.



            Plans are Not Preparedness

            Another issue is the false sense of confidence that traditional IR plans can create. Organizations conduct
            tabletop exercises that are, essentially, storytelling sessions. Participants gather in a room (or on Zoom),
            discuss a hypothetical scenario, and check a box indicating that the plan was tested. However, real-world
            incidents don’t unfold in two hours. They evolve over days or weeks. They require coordination across
            security, legal, IT, HR, line-of-business executives, and communications teams.

            They demand live decision-making, systems access, and continuous updates – and that surely doesn’t
            fit neatly into a pre-scheduled two-hour window. They can (and will) take place at the worst possible time:
            when your CISO is sleeping, when your General Counsel is on vacation, or during your busiest time of
            year. A tabletop won’t tell you whether half your team lacks access to key tooling, or whether the legal
            team and the SOC are aligned on notification timelines. You only discover those gaps when you practice
            with real systems, fundamental roles, and real timelines.


            Modern incident response requires a shift in mindset. Static documentation must transform into active
            coordination. Effective response requires a dynamic command and control approach. You have your
            primary objective (neutralizing and eliminating the threat). Still, dozens of side quests must be managed
            along  the way:  security  analysts  investigating  alerts,  IT  staff  remediating  systems,  legal and  privacy
            teams handling notification requirements, executives assessing the business impact, and employees on
            the front lines managing the company’s reputation with customers. The list goes on.


            These side quests branch out unexpectedly, they loop back, and they often require different teams to act
            independently while staying aligned. For that to work, there needs to be a common operating picture: one
            place where tasks are assigned, updates are logged, decisions are documented, and everyone involved
            can see the full scope of what’s happening.

            Yes, this presents technology challenges. But at its core, this tends to be a human challenge. In my
            experience,  the  most  overlooked  factors  in  IR  are  trust,  relationships,  and  communication.  Incident
            response teams aren’t just lists of names in a plan; they’re people who need to work together under
            extreme stress. The best way to build that capability is to invest in relationships before a crisis occurs.




            Cyber Defense eMagazine – September 2025 Edition                                                                                                                                                                                                          334
            Copyright © 2025, Cyber Defense Magazine. All rights reserved worldwide.
   329   330   331   332   333   334   335   336   337   338   339