Computerworld - It's clear that an effective response to a data breach requires that IT have close relationships with the legal and public relations departments -- relationships that simply don't exist in many large companies.
But at the very least, IT needs to know whom to call and how to reach them. Without that, "it can really degrade into a Chinese fire drill, where everyone is running around trying to call other people," says Peter Gregory, chief security strategist at VantagePoint Security. The information that IT needs to share includes the nature of the event, what kind of data might have been affected and how it was affected, says Eric Welz, senior solutions architect at Vanguard Managed Solutions. For instance, was data altered or deleted, or was the application unavailable for some period of time?
When discussing a possible security lapse with business people, avoid jargon. "You can say there was an overflow in the database logs, and they'll say, 'Tell me something I can use,'" Gregory says. "It usually takes someone who can talk on both sides of the fence to properly describe the situation in business terms."
Many experts say the sooner you involve attorneys, the better. Scott Sobel, vice president at Levick Strategic Communications, compares the situation to that of a city that assigns a district attorney as soon as a crime occurs. "They advise the cops from the very beginning on how to interview people and how to protect evidence," he says. Similarly, he says, "there should be thought put into a legal model for CIOs and other C-suite executives."
For instance, managers may be tempted to launch their own investigations, asking supervisors to interview IT staffers about what happened. But the information uncovered in those interviews could be considered discoverable evidence -- meaning it would have to be disclosed upon request in court, says Sobel. If an attorney does the interviewing, the information could be protected under the attorney-client privilege.
"You have to resist the urge to fix things immediately," he says. "The sooner attorneys get involved, the better off you are."
Read more about Security in Computerworld's Security Topic Center.
- Warning: Cloud Data at Risk Experts agree that relying on SaaS vendors to backup and restore your data is dangerous. Yet that's exactly what huge portions of the...
- The Opportunities and Challenges of the Cloud In this report F5 poses questions to IDC analysts, Sally Hudson and Phil Hochmuth, on behalf of F5's customers to better understand the...
- Mobile First: Securing Information Sprawl Learn how the partnership between Box and MobileIron can help you execute a "mobile first" strategy that manages and secures both mobile apps...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!