Create an effective incident response (IR) plan to mitigate the impact of cyberattacks
When it comes to modern cybersecurity, protection is only half of the equation. Business leaders must assume that they will, at some point, fall victim to a security incident. When that happens, a coordinated, cross-functional team will need to move fast to minimize the damage.
A strong incident response (IR) plan is key to detecting, responding to, and managing security incidents in a timely manner and rapidly returning technologies, processes, and staff to normal operations, and IR has become increasingly fundamental as the sophistication and severity of cyberattacks push the cost of cybersecurity incidents to new highs.
CohnReznick’s Cybersecurity, Technology Risk, and Privacy practice combines leading risk-management and security processes and technologies to create a tailored IR program based on your specific needs, making it easier to safeguard your sensitive data, intellectual property, and brand reputation, as well as meet compliance and regulatory obligations.
The benefits of a clear and coordinated IR program
- An established and tested IR program, coupled with business continuity and disaster recovery plans, will help improve incident response time and resiliency. These programs enable organizations to:
- Rapidly take action to remediate an incident
- Better triage reported and detected security events
- Comply with any applicable compliance or regulatory requirements and align with industry standards and frameworks
- Establish processes to coordinate the response effort across teams and functions, including business unit stakeholders, management, and legal
- Provide clear documentation of IR processes, roles, and responsibilities
- Promote a culture of security and data privacy across the organization
- Increase awareness of other potential cybersecurity threats facing the organization
- Strengthen communication with executive leaders on security incidents to gain buy-in and support for strategic decisions and remediation efforts
- Foster a culture of continuous improvement based on “lessons learned”

Leading IR programs are often based on the National Institute of Standards and Technology (NIST) Computer Security Incident Handling Guide (NIST Special Publication 800-61). We help organizations develop programs that follow its four-phase approach:
Preparation: Establish responsibilities and objectives. Regularly assess systems and applications for risks. Understand, prioritize, and mitigate threats. Identify and monitor critical resources; understand baseline/normal operations and behavior. Train and equip employees to respond to incidents.
Detection: Monitor computer security software alerts, logs, publicly available information, and people for precursors of a future attack and indicators of an ongoing or completed attack. Analyze, validate, document, and prioritize incidents and take appropriate action (including notification of key parties).
Containment, Eradication, and Recovery: Respond to attacks before they cause significant damage. Isolate affected systems for analysis, eliminate components of the incident (e.g., malware, account breaches), block communications with the attacker, and identify vulnerabilities for remediation. Gather and document evidence. Restore systems to normal operation and implement changes to prevent future incidents. Identify the attacker.
Post-Incident Activity: Learn from previous incidents. Review attacks, responses, and metrics, and identify improvements. Retain evidence and update IR plans.
Communications and employee training are essential
The responsibility for incident response is not solely that of the IT function. An effective IR program must be developed and communicated across the entire organization – and led by senior management.
It is vital that there be an ongoing commitment to user security training and awareness. Tabletop exercises and drills can help reinforce steps and processes that all stakeholders – C-suite executives, third parties, IT admins, and program leaders – will need to take in remediating an incident.
CohnReznick IR services
- Incident response assessment
- Incident response plan development and implementation
- Incident response as a service
- Business continuity management
- Disaster recovery planning
- Notification requirements
- IR tabletop exercises and periodic training
Bhavesh Vadhani, Principal, Global Leader, Cybersecurity, Privacy, and Technology Risk
703.847.4418
Thomas McDermott, Principal, Cybersecurity, Privacy, and Technology Risk
973.364.7836
Ali Khraibani, Senior Manager, Cybersecurity, Privacy, and Technology Risk
862.245.5166
Related Services
The C-Suite Dashboard
Keep Your Business Moving Forward
-
Press ReleaseSun joins CohnReznick as Principal, CybersecurityDavid Sun leads CohnReznick’s security incident response and recovery; computer forensic and litigation support; and cloud security services.
-
InsightUnderstanding Zero TrustBhavesh Vadhani, Adonye ChamberlainRead about the evolution of this cybersecurity paradigm, why it is increasingly necessary, and how to get started on its implementation.
-
InsightBe on guard for phishing attacks amid bank collapsesBhavesh VadhaniAs scammers take advantage of the chaos caused by the Silicon Valley Bank and Signature Bank turmoil, keep these key security principles top of mind.
-
InsightProposed regulatory changes increase board responsibility for cybersecurity programsScott Corzine, Bhavesh VadhaniProposed regulations may increase the responsibility of corporate board directors with cybersecurity programs. Learn more.
-
Press ReleaseCohnReznick adds two senior leaders to growing Cybersecurity, Technology Risk, and Privacy practiceScott Corzine, Managing Director, and Stephen P. Gilmer, Director, have joined CohnReznick's Cybersecurity, Technology Risk and Privacy practice, bringing extensive experience in cybersecurity risk, risk management, compliance, and operational impact.
-
InsightWhat fintech companies need to know about the convergence of cybersecurity and data privacyAlex Castelli, Bhavesh Vadhani, Deborah Nitka and Asael MeirWith more laws and regulations being introduced, poor cybersecurity and privacy practices are not acceptable. We detail what fintech companies need to know. Learn more.
-
InsightTorigence: The gateway to intelligent data insightsSupported by AI-enabled solutions, CohnReznick’s Torigence helps organizations sort, decipher, and analyze what matters most. Learn more.