Create an effective incident response (IR) plan to mitigate the impact of cyberattacks
When it comes to modern cybersecurity, protection is only half of the equation. Business leaders must assume that they will, at some point, fall victim to a security incident. When that happens, a coordinated, cross-functional team will need to move fast to minimize the damage.
A strong incident response (IR) plan is key to detecting, responding to, and managing security incidents in a timely manner and rapidly returning technologies, processes, and staff to normal operations, and IR has become increasingly fundamental as the sophistication and severity of cyberattacks push the cost of cybersecurity incidents to new highs.
CohnReznick’s Cybersecurity, Technology Risk, and Privacy practice combines leading risk-management and security processes and technologies to create a tailored IR program based on your specific needs, making it easier to safeguard your sensitive data, intellectual property, and brand reputation, as well as meet compliance and regulatory obligations.
The benefits of a clear and coordinated IR program
- An established and tested IR program, coupled with business continuity and disaster recovery plans, will help improve incident response time and resiliency. These programs enable organizations to:
- Rapidly take action to remediate an incident
- Better triage reported and detected security events
- Comply with any applicable compliance or regulatory requirements and align with industry standards and frameworks
- Establish processes to coordinate the response effort across teams and functions, including business unit stakeholders, management, and legal
- Provide clear documentation of IR processes, roles, and responsibilities
- Promote a culture of security and data privacy across the organization
- Increase awareness of other potential cybersecurity threats facing the organization
- Strengthen communication with executive leaders on security incidents to gain buy-in and support for strategic decisions and remediation efforts
- Foster a culture of continuous improvement based on “lessons learned”

Leading IR programs are often based on the National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide (NIST Special Publication 800-61). We help organizations develop programs that follow its four-phase approach:
Preparation: Establish responsibilities and objectives. Regularly assess systems and applications for risks. Understand, prioritize, and mitigate threats. Identify and monitor critical resources; understand baseline/normal operations and behavior. Train and equip employees to respond to incidents.
Detection: Monitor computer security software alerts, logs, publicly available information, and people for precursors of a future attack and indicators of an ongoing or completed attack. Analyze, validate, document, and prioritize incidents and take appropriate action (including notification of key parties).
Containment, Eradication, and Recovery: Respond to attacks before they cause significant damage. Isolate affected systems for analysis, eliminate components of the incident (e.g., malware, account breaches), block communications with the attacker, and identify vulnerabilities for remediation. Gather and document evidence. Restore systems to normal operation and implement changes to prevent future incidents. Identify the attacker.
Post-Incident Activity: Learn from previous incidents. Review attacks, responses, and metrics, and identify improvements. Retain evidence and update IR plans.
Communications and employee training are essential
The responsibility for incident response is not solely that of the IT function. An effective IR program must be developed and communicated across the entire organization – and led by senior management.
It is vital that there be an ongoing commitment to user security training and awareness. Tabletop exercises and drills can help reinforce steps and processes that all stakeholders – C-suite executives, third parties, IT admins, and program leaders – will need to take in remediating an incident.
CohnReznick IR services
- Incident response assessment
- Incident response plan development and implementation
- Incident response as a service
- Business continuity management
- Disaster recovery planning
- Notification requirements
- IR tabletop exercises and periodic training
Bhavesh Vadhani, Principal, Global Leader, Cybersecurity, Privacy, and Technology Risk
703.847.4418
Thomas McDermott, Principal, Cybersecurity, Privacy, and Technology Risk
973.364.7836
Ali Khraibani, Senior Manager, Cybersecurity, Privacy, and Technology Risk
862.245.5166
Related Services
The C-Suite Dashboard
Keep Your Business Moving Forward
-
InsightSEC proposes new rules on public company cybersecurity incident reporting, risk management disclosuresBhavesh VadhaniPublic companies could face a tight new timeline for disclosing material incidents, plus mandates to detail how they manage cyber risk. Read more.
-
InsightNew law requires ‘critical infrastructure’ organizations to report cybersecurity incidents, ransomware paymentsBhavesh Vadhani, Daryouche Behboudi, Deborah NitkaThe Cyber Incident Reporting for Critical Infrastructure Act requires certain entities to report attacks within 72 hours, ransomware payments within 24.
-
InsightFuture of cannabis – Cannabis Quarterly insights, Q1 2022Read our team’s perspectives on taxation, data strategy, and data privacy (including California’s CPRA) in CohnReznick’s CannaQuarterly newsletter.
-
InsightSEC proposes cybersecurity rules, incident disclosure for investment funds and advisorsIn addition to strengthening threat management, information protection, and other key areas, the SEC aims to boost board oversight. Read more.
-
InsightProtect your organization against nation-state cyberattacksAmid federal warnings to boost cybersecurity vigilance, take these steps to understand your capabilities and implement further safeguards.
-
InsightCalifornia’s Consumer Privacy Rights Act: What you need to knowDaryouche Behboudi, Deborah NitkaBusinesses that collect California consumers’ personal data will soon need to comply with a new set of rules under the CPRA. Read more.
-
InsightWhite House issues new guidance on cybersecurity for federal agencies via National Security Memorandum 8Bhavesh Vadhani, Daryouche Behboudi, Ali KhraibaniNational Security Memorandum 8 spells out requirements published in May 2021’s Executive Order 14028. Read more.