How To Audit Your
Incident Response Plan
Agenda



• Introductions

• Incident Response Plans

• Audit Checklist

• Q&A




                            Page 2
Introductions: Today‟s Speakers


• Ted Julian - Chief Marketing Officer, Co3
   • Security / Compliance entrepreneur
   • Security industry analyst

• Michael Bruemmer – Vice President, Experian®
  Data Breach Resolution
  • CIPP/US, CHC
  • IAPP Certification Advisory Board


                         Page 3
Co3 Automates Breach Management

PREPARE                                        ASSESS
Improve Organizational                         Quantify Potential
Readiness                                      Impact, Support Privacy
•   Assign response team                       Impact Assessments
•   Describe environment                       •   Track events
•   Simulate events and incidents              •   Scope regulatory requirements
•   Focus on organizational gaps               •   See $ exposure
                                               •   Send notice to team
                                               •   Generate Impact Assessments




REPORT                                         MANAGE
Document Results and                           Easily Generate Detailed
Track Performance                              Incident Response Plans
• Document incident results                    •   Escalate to complete IR plan
• Track historical performance                 •   Oversee the complete plan
• Demonstrate organizational                   •   Assign tasks: who/what/when
  preparedness                                 •   Notify regulators and clients
• Generate audit/compliance reports            •   Monitor progress to completion




                                      Page 4
Experian® Data Breach Resolution

   Pre-Breach Risk
                         Forensics
   Assessment
                                                 Breach Response
                                                 & Fraud Resolution
    •   Inventory of     •   Preservation of
        Systems              evidence            •   Incident
                                                     Management
    •   Threat and       •   Reconstruction of
        vulnerability        data sources        •   Notification
        assessment       •   Forensic analysis
                                                 •   Call Center
                             of preserved or
    •   Evolution of                                 Support
                             reconstructed
        controls             data sources        •   Identity Theft
    •   Risk Ranking     •   Searches for            Protection
                             suspected kinds     •   Fraud Resolution
    •   Communicating
                             of PII
        and Monitoring
                         •   Aggregation of      •   Reporting
                             identified PII


                                  Page 5
Incident Response Plan

• Crucial to have in place
• Streamlines the process
• What to Include:
    • The Team and Responsibilities
    • Testing / Fire drills
    • Third Party Support
        • Outside counsel
        • Compliance
        • Forensics
        • Data Breach Resolution Vendor


                            Page 6
Why Auditing Your IR Plan Is A Must

• Ensures you have accurate, up-to-date information

• Allows the process to be refined

• Identifies errors in advance

• Ensures everything in order before a breach occurs

• Doesn‟t cut into crucial response time post-breach



                                 Page 7
7 Checklist Items To Keep In Mind

• Update your internal contact list
• Verify that your plan is comprehensive
• Double check your vendor contracts
• Review notification guidelines(State and Federal)
• Check up on third parties that have access to your data
• Evaluate IT security
• Review staff security awareness




                              Page 8
Update Your Contact List

• Make sure the contact info for each member is up-to-date
  • Internal
  • External

• Note department heads

• People are 100% committed during a breach

• Re-distribute list once updated



                              Page 9
Verify That Your Plan Is Comprehensive

• Plan Revisions
  • Major company changes
  • New departments
  • Data management policy adjustments

• Ensure Departments Know Their Roles

• Fire Drillls / Rehearsals




                              Page 10
Double Check Your Vendor Contracts

• Forensics Team

• Attorneys

• Data Breach Resolution Provider

• Law Enforcement

• Current / Accessible

• Ensure They Still Match Your Needs

                            Page 11
Review Notification Guidelines

• Ensure your plan reflects the latest state legislation

• Notification letter templates address new laws

• Update contact list
  • State AGs
  • Government Agencies
  • Media

• Healthcare Providers: DHHS and OCR contacts

• Response team should understand reporting procedures



                                     Page 12
Check On 3rd Parties With Access To Your Data

• Are they following your protection rules?

• Educate them on any new relevant legislation

• Stress the importance of immediate notification

• Go over the resolution process

• Healthcare companies: HIPAA requirements
   • Establish Business Associate Agreements (BAAs)



                              Page 13
Evaluate IT Security

• Re-evaluate where sensitive / regulated data is stored

• Ensure proper access controls are in place

• Check that software and system updates are installed

• Verify that monitoring / reporting systems are working and
  up-to-date

• Ensure back-ups are securely stored


                              Page 14
Review Staff Security Awareness

• Are Initial Background Checks valid? Random updates?

• Regular employee Security Awareness Training

• Practice and audit proper information disposal(hard & soft)

• Train staff to identify cyber threats

• Require password changes every three months

• Physical security for all devices

                                Page 15
POLL
How Often You Should Audit?

• HCCA recommends regular monitoring where PHI handled

• Monitoring is part of any risk assessment plan

• Audit when objective results needed and integrity is critical

• Independent (outside) audits provide the best perspective

• OIG - „annual audit to minimize risk‟



                               Page 17
POLL
When Should You Update Your Response Plan?

• When new legislation passes (state, federal, and industry
  regulators)

• When response team members leave the company

• When new vendors join the process

• When new security procedures are implemented




                             Page 19
QUESTIONS
“Co3 Systems makes the process of
                                 planning for a nightmare scenario as
                                 painless as possible, making it an Editors‟
                                 Choice.”
                                PC MAGAZINE, EDITOR’S CHOICE


One Alewife Center, Suite 450
                                “Co3…defines what software packages
Cambridge, MA 02140              for privacy look like.”
PHONE 617.206.3900
                                GARTNER
WWW.CO3SYS.COM

                                “Platform is comprehensive, user
                                 friendly, and very well designed.”
                                PONEMON INSTITUTE




                                Michael Bruemmer, Vice President, Experian®
                                Data Breach Resolution
                                Michael.Bruemmer@Experian.com
                                www.Experian.com/DataBreach
                                Blog: www.Experian.com/DBBlog

More Related Content

PPTX
Domain 1 - Security and Risk Management
PPTX
Security risk management
PPTX
Cyber Kill Chain.pptx
PPT
8. operations security
PPTX
Cyber Security roadmap.pptx
PPTX
2017 Security Report Presentation
PPT
A Guide to Managed Security Services
PPTX
Chapter 11: Information Security Incident Management
Domain 1 - Security and Risk Management
Security risk management
Cyber Kill Chain.pptx
8. operations security
Cyber Security roadmap.pptx
2017 Security Report Presentation
A Guide to Managed Security Services
Chapter 11: Information Security Incident Management

What's hot (20)

PPTX
Risk Management and Security in Strategic Planning
PDF
Business case for information security program
PPTX
102 Information security standards and specifications
PDF
Types of Threat Actors and Attack Vectors
PDF
Cybersecurity Fundamental Course by Haris Chughtai.pdf
PPTX
Phishing Scams: 8 Helpful Tips to Keep You Safe
PDF
7 cyber security questions for boards
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Security Information and Event Managemen
PPTX
Risk Management Approach to Cyber Security
PDF
Networking Fundamental Course by Haris Chughtai
PPT
Chapter2 the need to security
PPTX
Cyber attacks and IT security management in 2025
PPSX
Cyber security awareness presentation
PPT
ETHICAL HACKING
PPTX
Security operation center
PDF
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
PPTX
امن المعلومات المحاضرة السادسة
PPTX
Cybersecurity Risk Management Framework Strategy Workshop
PPT
Security tools
Risk Management and Security in Strategic Planning
Business case for information security program
102 Information security standards and specifications
Types of Threat Actors and Attack Vectors
Cybersecurity Fundamental Course by Haris Chughtai.pdf
Phishing Scams: 8 Helpful Tips to Keep You Safe
7 cyber security questions for boards
Cybersecurity 1. intro to cybersecurity
Security Information and Event Managemen
Risk Management Approach to Cyber Security
Networking Fundamental Course by Haris Chughtai
Chapter2 the need to security
Cyber attacks and IT security management in 2025
Cyber security awareness presentation
ETHICAL HACKING
Security operation center
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
امن المعلومات المحاضرة السادسة
Cybersecurity Risk Management Framework Strategy Workshop
Security tools
Ad

Viewers also liked (20)

PDF
security-checklist-database
PPTX
Computer networking
PPTX
Predictive Analytics: Context and Use Cases
PPT
Web site int audit checklist intent
DOC
Capex audit checklist
PDF
Website Audit Checklist
PPT
Ch12 - Organisation theory design and change gareth jones
PPTX
IS Audit Checklist- by Software development company in india
PPTX
Summer Training Presentation On HMT Machine Tools Ltd
PDF
101 Free Online Marketing Resources For Entrepreneurs
DOCX
Iso 9001 2015 audit checklist
PDF
Technical Marketing is the Price of Admission
PDF
Program management audit checklist
PDF
13 information system audit of banks
PPTX
Information System audit
PPSX
Landforms 60 - PowerPoint - Version 2
PPT
Iso Process Audit Training
PPT
Integrated treasury management in banks
DOCX
Audit Checklist for Information Systems
PPT
Entrepreneurship And Business Management
security-checklist-database
Computer networking
Predictive Analytics: Context and Use Cases
Web site int audit checklist intent
Capex audit checklist
Website Audit Checklist
Ch12 - Organisation theory design and change gareth jones
IS Audit Checklist- by Software development company in india
Summer Training Presentation On HMT Machine Tools Ltd
101 Free Online Marketing Resources For Entrepreneurs
Iso 9001 2015 audit checklist
Technical Marketing is the Price of Admission
Program management audit checklist
13 information system audit of banks
Information System audit
Landforms 60 - PowerPoint - Version 2
Iso Process Audit Training
Integrated treasury management in banks
Audit Checklist for Information Systems
Entrepreneurship And Business Management
Ad

Similar to How to Audit Your Incident Response Plan (20)

PPTX
Incident Response in the age of Nation State Cyber Attacks
PPTX
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
PPTX
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
PPTX
You've Been Breached: How To Mitigate The Incident
PDF
Anatomy Of A Breach: The Good, The Bad & The Ugly
PPTX
Incident Response: Security's Special Teams
PPTX
2012 Breach Lessons Learned - 2013 Do Differents
PPT
Module 9 - ASP Privacy Management Certfication.ppt
PPTX
Deconstructing Data Breach Cost
PDF
Co3 rsc r5
PDF
Internal Controls Over Information Systems
PPT
Security Manager - Slides - Module 9 Powerpoint Presentation
PPT
Security Manager - Slides - Module 9 Powerpoint Presentation
PPT
Security Manager - Slides - Module 9 Powerpoint Presentation
PDF
5 Steps to Improve Your Incident Response Plan
PPTX
Cybersecurity Frameworks and You: The Perfect Match
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
CHAPTER 5 -Information assurance management.pdf
PDF
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
PDF
Steps in it audit
Incident Response in the age of Nation State Cyber Attacks
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
Customer Favorite Features: Popular Co3 Product Updates & A Special Promotion
You've Been Breached: How To Mitigate The Incident
Anatomy Of A Breach: The Good, The Bad & The Ugly
Incident Response: Security's Special Teams
2012 Breach Lessons Learned - 2013 Do Differents
Module 9 - ASP Privacy Management Certfication.ppt
Deconstructing Data Breach Cost
Co3 rsc r5
Internal Controls Over Information Systems
Security Manager - Slides - Module 9 Powerpoint Presentation
Security Manager - Slides - Module 9 Powerpoint Presentation
Security Manager - Slides - Module 9 Powerpoint Presentation
5 Steps to Improve Your Incident Response Plan
Cybersecurity Frameworks and You: The Perfect Match
Top Cybersecurity Challenges Facing Your Business
CHAPTER 5 -Information assurance management.pdf
IT Compliance and Governance with DLP Controls and Vulnerability Scanning Sof...
Steps in it audit

More from Resilient Systems (20)

PDF
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
PPTX
Co3's Annual Review & Predictions Webinar
PPTX
By Popular Demand: Co3's Latest and Greatest Features
PDF
Are We Breached How to Effectively Assess and Manage Incidents
PDF
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
PDF
Encryption: Who, What, When, Where, and Why It's Not a Panacea
PPTX
How To Build An Incident Response Function
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PDF
EU Cyber Attacks And The Incident Response Imperative
PDF
Incident Response: How To Prepare
PPTX
The Target Breach - Follow The Money EU
PDF
How To Turbo-Charge Incident Response With Threat Intelligence
PPTX
New CISO - The First 90 Days
PDF
How To Stop Target-Like Breaches In Their Tracks
PDF
The Target Breach – Follow The Money
PDF
A Breach Carol: 2013 Review, 2014 Predictions
PDF
Incident Response: Don't Mess It Up, Here's How To Get It Right
PDF
Treat a Breach Like a Customer, Not a Compliance Issue
PPTX
You're Breached: Information Risk Analysis for Today's Threat Landscape
PPTX
How to Build a Successful Incident Response Program
Data Breach Crisis Control – How to Communicate When You’re in the Hot Seat
Co3's Annual Review & Predictions Webinar
By Popular Demand: Co3's Latest and Greatest Features
Are We Breached How to Effectively Assess and Manage Incidents
Ready or Not, Here They Come Preparing For Phase 2 HIPAA Compliance Audits
Encryption: Who, What, When, Where, and Why It's Not a Panacea
How To Build An Incident Response Function
Today's Breach Reality, The IR Imperative, And What You Can Do About It
EU Cyber Attacks And The Incident Response Imperative
Incident Response: How To Prepare
The Target Breach - Follow The Money EU
How To Turbo-Charge Incident Response With Threat Intelligence
New CISO - The First 90 Days
How To Stop Target-Like Breaches In Their Tracks
The Target Breach – Follow The Money
A Breach Carol: 2013 Review, 2014 Predictions
Incident Response: Don't Mess It Up, Here's How To Get It Right
Treat a Breach Like a Customer, Not a Compliance Issue
You're Breached: Information Risk Analysis for Today's Threat Landscape
How to Build a Successful Incident Response Program

Recently uploaded (20)

PDF
El futuro empresarial 2024 una vista gen
PDF
Management Theories and Digitalization at Emirates Airline
PPTX
TS - CIM-as of august 2023 .pptx
PPTX
Hospitality & tourism management.pptxHospitality & tourism management.pptx
PPTX
organizational behavior notes prepared by sonam lama sawan lama
PDF
The Role of School Boards in Educational Management (www.kiu.ac.ug)
PDF
El futuro en e sector empresarial 2024 e
PDF
Investment in CUBA. Basic information for United States businessmen (1957)
PDF
Shriram Finance, one of India's leading financial services companies, which o...
PDF
The Evolution of Legal Communication through History (www.kiu.ac.ug)
PDF
The Impact of Historical Events on Legal Communication Styles (www.kiu.ac.ug)
PDF
IFRS Green Book_Part B for professional pdf
PDF
The Dynamic CLOs Shaping the Future of the Legal Industry in 2025.pdf
PDF
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
PDF
Nante Industrial Plug Socket Connector Sustainability Insights
PPTX
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx
PDF
BeMetals_Presentation_September_2025.pdf
DOCX
“Strategic management process of a selected organization”.Nestle-docx.docx
PPTX
Enterprises are Classified into Two Categories
PDF
the role of manager in strategic alliances
El futuro empresarial 2024 una vista gen
Management Theories and Digitalization at Emirates Airline
TS - CIM-as of august 2023 .pptx
Hospitality & tourism management.pptxHospitality & tourism management.pptx
organizational behavior notes prepared by sonam lama sawan lama
The Role of School Boards in Educational Management (www.kiu.ac.ug)
El futuro en e sector empresarial 2024 e
Investment in CUBA. Basic information for United States businessmen (1957)
Shriram Finance, one of India's leading financial services companies, which o...
The Evolution of Legal Communication through History (www.kiu.ac.ug)
The Impact of Historical Events on Legal Communication Styles (www.kiu.ac.ug)
IFRS Green Book_Part B for professional pdf
The Dynamic CLOs Shaping the Future of the Legal Industry in 2025.pdf
France's Top 5 Promising EdTech Companies to Watch in 2025.pdf
Nante Industrial Plug Socket Connector Sustainability Insights
IndustrialAIGuerillaInnovatorsARCPodcastEp3.pptx
BeMetals_Presentation_September_2025.pdf
“Strategic management process of a selected organization”.Nestle-docx.docx
Enterprises are Classified into Two Categories
the role of manager in strategic alliances

How to Audit Your Incident Response Plan

  • 1. How To Audit Your Incident Response Plan
  • 2. Agenda • Introductions • Incident Response Plans • Audit Checklist • Q&A Page 2
  • 3. Introductions: Today‟s Speakers • Ted Julian - Chief Marketing Officer, Co3 • Security / Compliance entrepreneur • Security industry analyst • Michael Bruemmer – Vice President, Experian® Data Breach Resolution • CIPP/US, CHC • IAPP Certification Advisory Board Page 3
  • 4. Co3 Automates Breach Management PREPARE ASSESS Improve Organizational Quantify Potential Readiness Impact, Support Privacy • Assign response team Impact Assessments • Describe environment • Track events • Simulate events and incidents • Scope regulatory requirements • Focus on organizational gaps • See $ exposure • Send notice to team • Generate Impact Assessments REPORT MANAGE Document Results and Easily Generate Detailed Track Performance Incident Response Plans • Document incident results • Escalate to complete IR plan • Track historical performance • Oversee the complete plan • Demonstrate organizational • Assign tasks: who/what/when preparedness • Notify regulators and clients • Generate audit/compliance reports • Monitor progress to completion Page 4
  • 5. Experian® Data Breach Resolution Pre-Breach Risk Forensics Assessment Breach Response & Fraud Resolution • Inventory of • Preservation of Systems evidence • Incident Management • Threat and • Reconstruction of vulnerability data sources • Notification assessment • Forensic analysis • Call Center of preserved or • Evolution of Support reconstructed controls data sources • Identity Theft • Risk Ranking • Searches for Protection suspected kinds • Fraud Resolution • Communicating of PII and Monitoring • Aggregation of • Reporting identified PII Page 5
  • 6. Incident Response Plan • Crucial to have in place • Streamlines the process • What to Include: • The Team and Responsibilities • Testing / Fire drills • Third Party Support • Outside counsel • Compliance • Forensics • Data Breach Resolution Vendor Page 6
  • 7. Why Auditing Your IR Plan Is A Must • Ensures you have accurate, up-to-date information • Allows the process to be refined • Identifies errors in advance • Ensures everything in order before a breach occurs • Doesn‟t cut into crucial response time post-breach Page 7
  • 8. 7 Checklist Items To Keep In Mind • Update your internal contact list • Verify that your plan is comprehensive • Double check your vendor contracts • Review notification guidelines(State and Federal) • Check up on third parties that have access to your data • Evaluate IT security • Review staff security awareness Page 8
  • 9. Update Your Contact List • Make sure the contact info for each member is up-to-date • Internal • External • Note department heads • People are 100% committed during a breach • Re-distribute list once updated Page 9
  • 10. Verify That Your Plan Is Comprehensive • Plan Revisions • Major company changes • New departments • Data management policy adjustments • Ensure Departments Know Their Roles • Fire Drillls / Rehearsals Page 10
  • 11. Double Check Your Vendor Contracts • Forensics Team • Attorneys • Data Breach Resolution Provider • Law Enforcement • Current / Accessible • Ensure They Still Match Your Needs Page 11
  • 12. Review Notification Guidelines • Ensure your plan reflects the latest state legislation • Notification letter templates address new laws • Update contact list • State AGs • Government Agencies • Media • Healthcare Providers: DHHS and OCR contacts • Response team should understand reporting procedures Page 12
  • 13. Check On 3rd Parties With Access To Your Data • Are they following your protection rules? • Educate them on any new relevant legislation • Stress the importance of immediate notification • Go over the resolution process • Healthcare companies: HIPAA requirements • Establish Business Associate Agreements (BAAs) Page 13
  • 14. Evaluate IT Security • Re-evaluate where sensitive / regulated data is stored • Ensure proper access controls are in place • Check that software and system updates are installed • Verify that monitoring / reporting systems are working and up-to-date • Ensure back-ups are securely stored Page 14
  • 15. Review Staff Security Awareness • Are Initial Background Checks valid? Random updates? • Regular employee Security Awareness Training • Practice and audit proper information disposal(hard & soft) • Train staff to identify cyber threats • Require password changes every three months • Physical security for all devices Page 15
  • 16. POLL
  • 17. How Often You Should Audit? • HCCA recommends regular monitoring where PHI handled • Monitoring is part of any risk assessment plan • Audit when objective results needed and integrity is critical • Independent (outside) audits provide the best perspective • OIG - „annual audit to minimize risk‟ Page 17
  • 18. POLL
  • 19. When Should You Update Your Response Plan? • When new legislation passes (state, federal, and industry regulators) • When response team members leave the company • When new vendors join the process • When new security procedures are implemented Page 19
  • 21. “Co3 Systems makes the process of planning for a nightmare scenario as painless as possible, making it an Editors‟ Choice.” PC MAGAZINE, EDITOR’S CHOICE One Alewife Center, Suite 450 “Co3…defines what software packages Cambridge, MA 02140 for privacy look like.” PHONE 617.206.3900 GARTNER WWW.CO3SYS.COM “Platform is comprehensive, user friendly, and very well designed.” PONEMON INSTITUTE Michael Bruemmer, Vice President, Experian® Data Breach Resolution [email protected] www.Experian.com/DataBreach Blog: www.Experian.com/DBBlog