Computerworld - It's clear that an effective response to a data breach requires that IT have close relationships with the legal and public relations departments -- relationships that simply don't exist in many large companies.
But at the very least, IT needs to know whom to call and how to reach them. Without that, "it can really degrade into a Chinese fire drill, where everyone is running around trying to call other people," says Peter Gregory, chief security strategist at VantagePoint Security. The information that IT needs to share includes the nature of the event, what kind of data might have been affected and how it was affected, says Eric Welz, senior solutions architect at Vanguard Managed Solutions. For instance, was data altered or deleted, or was the application unavailable for some period of time?
When discussing a possible security lapse with business people, avoid jargon. "You can say there was an overflow in the database logs, and they'll say, 'Tell me something I can use,'" Gregory says. "It usually takes someone who can talk on both sides of the fence to properly describe the situation in business terms."
Many experts say the sooner you involve attorneys, the better. Scott Sobel, vice president at Levick Strategic Communications, compares the situation to that of a city that assigns a district attorney as soon as a crime occurs. "They advise the cops from the very beginning on how to interview people and how to protect evidence," he says. Similarly, he says, "there should be thought put into a legal model for CIOs and other C-suite executives."
For instance, managers may be tempted to launch their own investigations, asking supervisors to interview IT staffers about what happened. But the information uncovered in those interviews could be considered discoverable evidence -- meaning it would have to be disclosed upon request in court, says Sobel. If an attorney does the interviewing, the information could be protected under the attorney-client privilege.
"You have to resist the urge to fix things immediately," he says. "The sooner attorneys get involved, the better off you are."
Read more about Security in Computerworld's Security Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts