{"id":11911,"date":"2019-06-13T09:21:12","date_gmt":"2019-06-13T08:21:12","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11911"},"modified":"2020-01-02T15:19:04","modified_gmt":"2020-01-02T14:19:04","slug":"preparing-for-a-cyber-crisis","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/","title":{"rendered":"Preparing for a Cyber Crisis"},"content":{"rendered":"<div class=\"uncode_text_column\">\n<div class=\"wavestone-intro\"><em>The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for a cyber-attack.<\/em><\/div>\n<\/div>\n<div class=\"uncode_text_column\"><\/div>\n<div>\n<h2>What do we mean by Cyber Crisis Management?<\/h2>\n<p>Cyber crisis management encompasses 3 key areas:<\/p>\n<ol>\n<li>Firstly, there is the\u00a0<strong>cyber resilience<\/strong>\u00a0side of things. You can liken this to an elastic band \u2013 how far it stretches is representative of how much a business can take away from its day-to-day operations in the face of a cyber-attack, how much redundancy is in place and how many layers of triage exist. High availability businesses\u00a0 with a strong resilience strategy for example,\u00a0may be able to deal with 1-2 incidents at the same time before operations are compromised.<\/li>\n<li>Secondly, you\u2019ve got the actual\u00a0<strong>cyber response<\/strong>\u00a0element.\u00a0This is about the ability to detect and respond to the cyber-attack as quickly and effectively as possible. Well-established cyber playbooks covering a variety of incidents and scenarios\u00a0will\u00a0allow\u00a0you detect, react and respond accordingly. They will help answer key questions such as:\u00a0<em>how do you detect the bad guys actually getting in?<\/em>\u00a0\u2026\u00a0<em>and what do you do once they\u2019re in?<\/em><\/li>\n<li>Finally, there\u2019s\u00a0<strong>cyber recovery<\/strong>. This occurs post-crisis and looks at how a business returns its IT estate to BAU operations. Cyber recovery is all about having a strategy to rebuild on the assumption that everything has gone (e.g. \u2018earth-scorched\u2019 scenario). For example, some organisations have pre-stored copies of critical information in a secure vault to allow them to rebuild and restore as necessary.<\/li>\n<\/ol>\n<\/div>\n<figure id=\"post-11913 media-11913\" class=\"align-none\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-11913 size-full\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/3-Cyber-Crisis-Elements-768x169.jpg\" alt=\"\" width=\"768\" height=\"169\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/3-Cyber-Crisis-Elements-768x169.jpg 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/3-Cyber-Crisis-Elements-768x169-437x96.jpg 437w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2019\/06\/3-Cyber-Crisis-Elements-768x169-71x16.jpg 71w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/figure>\n<p>&nbsp;<\/p>\n<div class=\"vc_custom_1557450197979 row-container\" data-parent=\"true\" data-section=\"1\">\n<div class=\"row single-top-padding no-bottom-padding single-h-padding limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column vc_custom_1557444574319\">\n<h2>How can C-level executives understand and make sure they\u2019re prepared for those attacks?<\/h2>\n<p>Simply,\u00a0<strong>prepare for the worst<\/strong>;\u00a0not too distant from that saying in the military of\u2026<em>train hard and fight easy<\/em>. A key message for top management in any organisation is that an effective response starts\u00a0way before the\u00a0attack might occur. Have those crisis management plans in place,\u00a0<strong>test, refine and test again<\/strong>. Know likely attack-scenarios and build flexibility into your plans to ensure that they are not too dogmatic in their application and still allow you to respond to the real-time threat.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"2\">\n<div class=\"row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<blockquote><p><em>C-level executives need to have a pragmatic and robust security posture, making sure that they practice table-top exercises and run red-team tests on a routine basis.<\/em><\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"3\">\n<div class=\"row no-top-padding no-bottom-padding single-h-padding limit-width row-parent\" data-height-ratio=\"3\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<p>We\u2019ve found that the real effectiveness of running simulation exercises, comes when you\u00a0<strong>mix the cyber<\/strong>\u00a0and\u00a0<strong>the real world<\/strong>\u00a0together. For example, previously we\u2019ve helped a global insurer understand what they might do if the crisis team\u2019s situation room was suddenly unavailable due to terrorist attack\u00a0<em>(\u2026 an extreme example of course).<\/em><\/p>\n<p>On a similar note, top management must prepare for the\u00a0<strong><em>\u2018n+1\u2019<\/em>\u00a0type scenarios<\/strong>. For example, many crisis response plans assume there is still email access, but what if this has been knocked out as part of the cyber-attack?\u00a0 In this situation, one solution may be to use a predefined WhatsApp network to call, message and share information. I\u2019ve even worked with a couple of companies who have their<strong>\u00a0business continuity plans on WhatsApp<\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"4\">\n<div class=\"row single-top-padding no-bottom-padding single-h-padding limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<p>Additionally, C-level executives need to take a pragmatic look at\u00a0<strong>what information they\u2019re really looking to protect<\/strong>; is it\u00a0financial, personal, employee-related? Notably, for an increasing number of organisations, their operations are not dependent on the bricks and mortar of the office but making sure that there is\u00a0<strong>availability<\/strong>\u00a0and\u00a0<strong>flow of informatio<\/strong>n e.g. by moving infrastructure to the cloud and improving their digital workplace can help run the business remotely.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"5\">\n<div class=\"row single-top-padding single-bottom-padding penta-h-padding limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<blockquote><p><em>What critical information can your business not function without? I think a lot of companies, from a crisis management perspective, never really answer that question unfortunately.<\/em><\/p><\/blockquote>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"6\">\n<div class=\"row no-top-padding no-bottom-padding single-h-padding limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<p>Given their high positions with organisations, C-level executives will likely come under scrutiny for their\u00a0<strong>external response<\/strong>. This is important in the fast-paced world of\u00a0<strong>social media<\/strong>, in which hackers will socialise the attack before they do.\u00a0For example,\u00a0with the 2017\u00a0<strong>Equifax breach<\/strong>, their communications were delayed\u00a0<em>(breach discovered on July 29<sup>th<\/sup>\u00a0but wasn\u2019t publicly announced until September 7<sup>th<\/sup>)<\/em>, often confused at times\u00a0<em>(some information about the severity of the attack muddling previous versions)<\/em>, and their apology lacked customer empathy\u00a0<em>(more corporate than sincere).<\/em>\u00a0Here, you can see how imperative it is to have a\u00a0<strong>robust crisis communications strategy<\/strong>\u00a0as the way senior management respond and react publicly will be\u00a0<strong>scrutinised<\/strong>\u00a0to the n<sup>th<\/sup>\u00a0degree; it should be\u00a0<strong>transparent, consistent and accurate.<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"row-container\" data-parent=\"true\" data-section=\"7\">\n<div class=\"row limit-width row-parent\" data-imgready=\"true\">\n<div class=\"row-inner\">\n<div class=\"pos-top pos-center align_left column_parent col-lg-12 single-internal-gutter\">\n<div class=\"uncol style-light\">\n<div class=\"uncoltable\">\n<div class=\"uncell no-block-padding\">\n<div class=\"uncont\">\n<div class=\"uncode_text_column\">\n<p>&nbsp;<\/p>\n<p><em>Although there are many different crisis management strategies out there, the key takeaway for top management is that rigorous preparation, testing and refinement of your cyber crisis management capability will go a long way when the time comes to use it for real.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. We sat down with Nick Prescot (Senior Manager, UK Cybersecurity practice) to discuss cyber crisis management and some key considerations to help C-level executives prepare for&#8230;<\/p>\n","protected":false},"author":1349,"featured_media":10285,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2777,3273],"tags":[2904,2968,2875,2871,3144],"coauthors":[3145],"class_list":["post-11911","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-digital-trust","category-ethical-hacking-indicent-response-en","tag-c-level","tag-crisis-management","tag-cyber-crisis","tag-cyberattack","tag-preparation-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Preparing for a Cyber Crisis - RiskInsight<\/title>\n<meta name=\"description\" content=\"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Preparing for a Cyber Crisis - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T08:21:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T14:19:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"3873\" \/>\n\t<meta property=\"og:image:height\" content=\"3873\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nick Prescot\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nick Prescot\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\"},\"author\":{\"name\":\"Nick Prescot\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a61f64c58086f14864fa2ba8fa09a3ef\"},\"headline\":\"Preparing for a Cyber Crisis\",\"datePublished\":\"2019-06-13T08:21:12+00:00\",\"dateModified\":\"2020-01-02T14:19:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\"},\"wordCount\":799,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"keywords\":[\"c-level\",\"crisis management\",\"cyber crisis\",\"cyberattack\",\"pr\u00e9paration\"],\"articleSection\":[\"Cybersecurity &amp; Digital Trust\",\"Ethical Hacking &amp; Incident Response\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\",\"name\":\"Preparing for a Cyber Crisis - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"datePublished\":\"2019-06-13T08:21:12+00:00\",\"dateModified\":\"2020-01-02T14:19:04+00:00\",\"description\":\"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg\",\"width\":3873,\"height\":3873,\"caption\":\"Start up new business project with rocket and clouds image, vector illustration. Flat design. Speed. Rocket flying in the sky above the clouds. Blue sky with white clouds.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Preparing for a Cyber Crisis\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a61f64c58086f14864fa2ba8fa09a3ef\",\"name\":\"Nick Prescot\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/nick-prescot\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Preparing for a Cyber Crisis - RiskInsight","description":"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/","og_locale":"en_US","og_type":"article","og_title":"Preparing for a Cyber Crisis - RiskInsight","og_description":"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/","og_site_name":"RiskInsight","article_published_time":"2019-06-13T08:21:12+00:00","article_modified_time":"2020-01-02T14:19:04+00:00","og_image":[{"width":3873,"height":3873,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","type":"image\/jpeg"}],"author":"Nick Prescot","twitter_misc":{"Written by":"Nick Prescot","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/"},"author":{"name":"Nick Prescot","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a61f64c58086f14864fa2ba8fa09a3ef"},"headline":"Preparing for a Cyber Crisis","datePublished":"2019-06-13T08:21:12+00:00","dateModified":"2020-01-02T14:19:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/"},"wordCount":799,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","keywords":["c-level","crisis management","cyber crisis","cyberattack","pr\u00e9paration"],"articleSection":["Cybersecurity &amp; Digital Trust","Ethical Hacking &amp; Incident Response"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/","name":"Preparing for a Cyber Crisis - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","datePublished":"2019-06-13T08:21:12+00:00","dateModified":"2020-01-02T14:19:04+00:00","description":"The\u00a0number of\u00a0cyber-attacks is increasing at an unprecedented rate with no two being the same. Preparation with C-level is essential.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/12\/Fotolia_73747996_Subscription_Monthly_XXL-Start-up-new-business-project-with-rocket\u00a9-derdy-Copie.jpg","width":3873,"height":3873,"caption":"Start up new business project with rocket and clouds image, vector illustration. Flat design. Speed. Rocket flying in the sky above the clouds. Blue sky with white clouds."},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2019\/06\/preparing-for-a-cyber-crisis\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"Preparing for a Cyber Crisis"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/a61f64c58086f14864fa2ba8fa09a3ef","name":"Nick Prescot","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/nick-prescot\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11911","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/1349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11911"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11911\/revisions"}],"predecessor-version":[{"id":11919,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11911\/revisions\/11919"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/10285"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11911"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11911"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11911"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11911"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}