Check out our companion blog!
Aug. 26, 2024

Incident Response Plan 101: From BIA to Execution

In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore the key components of a robust plan, from conducting a business impact analysis to creating scenario-specific playbooks.

Learn why having an incident response plan is crucial in today's cyber threat landscape and how to design one that works for your organization. We discuss the importance of regular updates, secure storage, and testing through tabletop exercises. Whether you're an IT professional or a business leader, this episode provides practical advice on preparing for and managing potential security incidents. Don't miss this essential guide to strengthening your organization's cyber resilience through comprehensive incident response planning.

Transcript

Speaker:

You found the backup wrap up your go-to podcast for all things

 

 


Speaker:

backup recovery and cyber recovery.

 

 


Speaker:

In this episode, we tackled the critical topic of incident response plans.

 

 


Speaker:

Once again, we've brought our resident cyber expert, Dr.

 

 


Speaker:

Mike Saylor from Black Swan Security, who starts by defining what an IR plan is and

 

 


Speaker:

how it's different from DR and BC plans.

 

 


Speaker:

We then talk about how you need different kind of response plans

 

 


Speaker:

for different kinds of incidents.

 

 


Speaker:

Like a cyber attack versus a failed RAID array.

 

 


Speaker:

We also delve into RACI diagrams and how they define who is

 

 


Speaker:

responsible, accountable, consulted and informed on any incidents.

 

 


Speaker:

Then we dig into where this plan should live and how you should make sure you

 

 


Speaker:

have access to it and the bad guys don't.

 

 


Speaker:

This is a packed episode I think you're gonna really like.

 

 


Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

 

 


Speaker:

Backup, and I've been passionate about this topic for over 30 years.

 

 


Speaker:

Ever since I had to tell my boss that our production database was toast

 

 


Speaker:

and there were no backups of it.

 

 


Speaker:

I don't want that to happen to you or anybody, and that's why I do this.

 

 


Speaker:

On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.

 

 


Speaker:

This is the backup wrap up.

 

 


Speaker:

Welcome to the show.

 

 


Speaker:

If I can ask you for just a quick second to go, press, subscribe or

 

 


Speaker:

follow so that you'll always be able to get our content, that would be great.

 

 


Speaker:

I am w Curtis Preston, AKA, Mr.

 

 


Speaker:

Backup, and I have with me a guy who keeps trying to get me to watch

 

 


Speaker:

this weird new version of the Lord of the Rings Prasanna Malaiyandi

 

 


Speaker:

ah, yes.

 

 


Speaker:

And you still have not seen it, although I did.

 

 


Speaker:

So my parents, so what I'm referring to is there's this new, it's not

 

 


Speaker:

even a Bollywood movie, I think it's technically a Telugu movie.

 

 


Speaker:

It's so tollywood, but it is called ky, A 2398 or something like that.

 

 


Speaker:

So it's supposed to be Yes, very.

 

 


Speaker:

Fantasy oriented.

 

 


Speaker:

Supposed to be really good shot in the modern day era or actually in the future.

 

 


Speaker:

And it has some pretty famous actors.

 

 


Speaker:

So from both the Telegu scene and the Thumb, and also from Hindi cinema.

 

 


Speaker:

So pretty much star in all star cast.

 

 


Speaker:

But I've been asking you, my parents actually went and saw it.

 

 


Speaker:

They said it was like three and a half hours and it was really long, but.

 

 


Speaker:

That might be like a.

 

 


Speaker:

couple naps.

 

 


Speaker:

Yeah, but it might be a couple naps.

 

 


Speaker:

for you, But it's only one episode or one movie.

 

 


Speaker:

I've been also trying to get you to watch Bahoo Bali one and two or the beginning

 

 


Speaker:

yeah.

 

 


Speaker:

That's the Lord of the Rings.

 

 


Speaker:

When I was talking about though, isn't it?

 

 


Speaker:

Oh, that's y.

 

 


Speaker:

Oh, you're right.

 

 


Speaker:

That is the Lord of the Rings

 

 


Speaker:

and that's like seven hours.

 

 


Speaker:

That's like seven hours long.

 

 


Speaker:

that's six hours.

 

 


Speaker:

But, uh, my wife and I, we did watch it y or over the weekend and so it's fine.

 

 


Speaker:

And it's really good though, Curtis, you should watch it.

 

 


Speaker:

You have until August 6th.

 

 


Speaker:

Uh, okay.

 

 


Speaker:

So as of this recording, I have one week to watch it.

 

 


Speaker:

Yes.

 

 


Speaker:

All right, well, we have with us again, our, um, can, can we call you our,

 

 


Speaker:

our resident cybersecurity expert?

 

 


Speaker:

Can

 

 


Speaker:

I feel like I've, I, I, I feel like I do reside here now.

 

 


Speaker:

I think so we've done enough episodes.

 

 


Speaker:

Um, so, uh, the CEO of Black Swan Security, Mike Sailor,

 

 


Speaker:

welcome to the show once again.

 

 


Speaker:

Thanks guys.

 

 


Speaker:

Great to be here.

 

 


Speaker:

So this week we want to talk about, we talk a lot about this.

 

 


Speaker:

It comes up a lot, uh, you know, in shows.

 

 


Speaker:

And everybody says you need a response plan, right?

 

 


Speaker:

And, uh, you know, an incident response plan.

 

 


Speaker:

And we talk, some people talk about a ransomware response plan, a cybersecurity

 

 


Speaker:

response plan, an incident response plan.

 

 


Speaker:

Can you just help?

 

 


Speaker:

Define all of those, like what, you know, do they, do they fit?

 

 


Speaker:

And, and of course I talk about a disaster recovery, uh, plan.

 

 


Speaker:

Where do all are, are these like Russian nesting dolls?

 

 


Speaker:

Well, and what's an incident response plan to start with?

 

 


Speaker:

Yeah.

 

 


Speaker:

are Russian nesting dolls.

 

 


Speaker:

Uh, so an incident response plan is what are you gonna do in the event that an

 

 


Speaker:

event, in the event that an event occurs?

 

 


Speaker:

you then classify as an incident.

 

 


Speaker:

And so first part of an incident response plan is, how do I do that?

 

 


Speaker:

You can't, you, you gotta define the difference then if

 

 


Speaker:

you're gonna use that event

 

 


Speaker:

That's where I'm, that's where I'm going.

 

 


Speaker:

Oh.

 

 


Speaker:

part is, the first part of, of your incident response plan is how do

 

 


Speaker:

I, how do I intake an event report?

 

 


Speaker:

Uh, could be smoke, it could be, uh, my computer's acting weird.

 

 


Speaker:

It could be.

 

 


Speaker:

Um, the website's down, uh, and then how do I classify that event as a type of

 

 


Speaker:

incident and then as a type of incident, what, what level of incident is it?

 

 


Speaker:

1, 2, 3, or, or however your organization classifies things.

 

 


Speaker:

And so the first part is that that analysis and categorization of an

 

 


Speaker:

event into, uh, an incident and, uh, incident type and criticality.

 

 


Speaker:

Right, and, and then

 

 


Speaker:

go ahead.

 

 


Speaker:

So then you have an incident, and based on what that incident type is, you

 

 


Speaker:

would have what's called a playbook.

 

 


Speaker:

So that playbook could be ransomware, that playbook could be denial of service,

 

 


Speaker:

the website's down, uh, operational, you know, uh, outage type of playbook.

 

 


Speaker:

Uh, or it could be, uh, misconduct, uh, you know, employee, employee misconduct

 

 


Speaker:

or trying to access stuff that shouldn't, unauthorized access type playbook.

 

 


Speaker:

Um, and you would.

 

 


Speaker:

You, you would do an analysis of your organization's most likely threats

 

 


Speaker:

and build playbooks based on those.

 

 


Speaker:

And then playbooks are like we've talked about in the past, just

 

 


Speaker:

sort of everything documented.

 

 


Speaker:

Hey, if this happens, here's all the people involved.

 

 


Speaker:

Here's all the steps that everyone takes.

 

 


Speaker:

Here's who's responsible for what actions, here's who I have to

 

 


Speaker:

talk to, and all the rest of that.

 

 


Speaker:

Right.

 

 


Speaker:

And here's who needs to be informed.

 

 


Speaker:

Right.

 

 


Speaker:

At least an outline.

 

 


Speaker:

Uh,

 

 


Speaker:

something's better than nothing.

 

 


Speaker:

And then, and then back to Curtis's question about disaster recovery.

 

 


Speaker:

And how does incident response plan it?

 

 


Speaker:

It is nested because an event becomes an incident and an incident

 

 


Speaker:

can then become a disaster.

 

 


Speaker:

'cause essentially a.

 

 


Speaker:

The, you know, you have a Dr.

 

 


Speaker:

Runbook, right?

 

 


Speaker:

Or a play, you know, you're saying playbook, playbook,

 

 


Speaker:

runbook, same thing to you.

 

 


Speaker:

Yeah.

 

 


Speaker:

It is.

 

 


Speaker:

So, um, it, it's a, I I think of it a, a bit like programming where Dr.

 

 


Speaker:

Runbook is, you know, is a function, is a library that can

 

 


Speaker:

be called by the bigger program.

 

 


Speaker:

Right.

 

 


Speaker:

So that, that to me is like the.

 

 


Speaker:

The, the deepest, nested part, right, because only after we've had an

 

 


Speaker:

incident, we've classified an incident.

 

 


Speaker:

We've classified it as a cybersecurity incident.

 

 


Speaker:

We've classified it as a, it's a ransomware event, and it's a

 

 


Speaker:

ransomware event that needs restore.

 

 


Speaker:

Right now we, you know, and then we have done our preparatory steps that

 

 


Speaker:

we need to do because, you know, I talk about a lot about this a lot,

 

 


Speaker:

and that is one of the big differences between a disaster recovery response

 

 


Speaker:

and a, a ransomware response is that almost always the disaster is over.

 

 


Speaker:

Right.

 

 


Speaker:

The flood has receded.

 

 


Speaker:

Um, because you, you can't start, you can't start your recovery

 

 


Speaker:

until the flood has receded.

 

 


Speaker:

The winds have stopped, the earthquake is over, the fire has

 

 


Speaker:

been put out, whatever the disaster was, it's over call the DR person.

 

 


Speaker:

The, the big difference with a cyber event is that the attack is ongoing

 

 


Speaker:

and you've got to put that fire out.

 

 


Speaker:

Uh, to, to use that analogy before you can ever call the DR person, and that's why

 

 


Speaker:

I'm saying it's sort of the most nested within, within the, the nesting dolls.

 

 


Speaker:

What do you think of that comment?

 

 


Speaker:

Completely agree.

 

 


Speaker:

And, and just to add a level of complexity with regard to backups,

 

 


Speaker:

uh, during your incident response.

 

 


Speaker:

If it's a ransomware where there's some compromise that happened

 

 


Speaker:

that led to the ransomware, then you've gotta make sure then also

 

 


Speaker:

that the backups you're restoring don't also include the compromise.

 

 


Speaker:

That you're trying to,

 

 


Speaker:

to tie off?

 

 


Speaker:

Correct.

 

 


Speaker:

lot more, a lot more attention to detail and, and analysis, uh, during

 

 


Speaker:

an incident than for sure, than, than, uh, cleaning up after a disaster.

 

 


Speaker:

So you have these, so you said you take the event, you identify it,

 

 


Speaker:

you put it into the right bucket of incidences, and then you.

 

 


Speaker:

Put a severity alongside it, and then you just sort of execute

 

 


Speaker:

your incident response plan.

 

 


Speaker:

Now, are these like, I am sure it's hard to cover every single incident

 

 


Speaker:

and severity or priority, right?

 

 


Speaker:

That goes alongside it.

 

 


Speaker:

So how do you sort of decide like, which ones am I actually going to

 

 


Speaker:

create an incident response plan for?

 

 


Speaker:

Which ones do I not need to?

 

 


Speaker:

Because it all comes down to.

 

 


Speaker:

Like resources in the company, right?

 

 


Speaker:

It does.

 

 


Speaker:

And, and that's where you're gonna start.

 

 


Speaker:

So in, in your incident response plan, and this, this goes.

 

 


Speaker:

Kind of back to the left a little bit in understanding the business

 

 


Speaker:

and the, the way it operates and how technology supports the business and,

 

 


Speaker:

and all the critical components of, uh, where, where the, the business

 

 


Speaker:

revenue and, and, um, focus is.

 

 


Speaker:

Uh.

 

 


Speaker:

Create an inventory of, of your, of your resources, both on the IT side.

 

 


Speaker:

We should already have that, especially from a disaster recovery perspective.

 

 


Speaker:

And I'll add this comment too.

 

 


Speaker:

If you have a mature disaster recovery plan, then a lot of

 

 


Speaker:

the work that you're gonna.

 

 


Speaker:

Put into creating your incident response plan should have already been done.

 

 


Speaker:

I've got an inventory of all our, our IT assets and where our data is

 

 


Speaker:

and the SLAs for, you know, if this machine's offline for an hour, we, we

 

 


Speaker:

lost a million dollars type of thing.

 

 


Speaker:

Well then, and the, and the, the resources we need to address those

 

 


Speaker:

disaster recovery activities.

 

 


Speaker:

Who's the sy?

 

 


Speaker:

Who owns that system?

 

 


Speaker:

Who's our network administrator?

 

 


Speaker:

Who's our active directory?

 

 


Speaker:

Who's who?

 

 


Speaker:

Who's our website?

 

 


Speaker:

You should, you should know who.

 

 


Speaker:

All those subject matter experts and stakeholders and owners are both on

 

 


Speaker:

the IT side and the business side.

 

 


Speaker:

Right?

 

 


Speaker:

So understanding that, um.

 

 


Speaker:

That environment of resources is critical to being successful in incident response.

 

 


Speaker:

All right, well then to your question about do we, you know, we can't possibly

 

 


Speaker:

have a playbook for everything, but what, what you'll learn, especially

 

 


Speaker:

after you, you do your first playbook and your first tabletop exercise,

 

 


Speaker:

is that there are very common

 

 


Speaker:

elements of every incident response.

 

 


Speaker:

You've got a leader.

 

 


Speaker:

That knows how to, that understands the environment and knows how to

 

 


Speaker:

categorize an event appropriately.

 

 


Speaker:

And then from that categorization of incident and priority can assemble

 

 


Speaker:

the right people from this inventory of resources to be effective

 

 


Speaker:

at responding to that incident.

 

 


Speaker:

You know, if it's ransomware, it's kind of an all hands on deck thing,

 

 


Speaker:

but if the website's down, I, I already know, I, I can look up who to call.

 

 


Speaker:

I need our

 

 


Speaker:

ISP, our host, our hosting site, the the person that wrote the website,

 

 


Speaker:

the person that knows all the backend systems that support the website.

 

 


Speaker:

I've got all that hammered out, and we'll get on a call and I've got their phone

 

 


Speaker:

number and their email and where they live and account numbers and all that stuff.

 

 


Speaker:

So you don't have to basically cry wolf every single time.

 

 


Speaker:

You don't, and you, and you should not.

 

 


Speaker:

Uh, so you know when, when an incident happens and, and or an event happens and

 

 


Speaker:

you're like, this is a true incident.

 

 


Speaker:

You don't go push the button.

 

 


Speaker:

You, you, you call the next person and get some, some, some feedback and

 

 


Speaker:

some collaboration, uh, and then you start to expand the team as necessary.

 

 


Speaker:

You don't, you don't call everybody to the table for every answer.

 

 


Speaker:

and, and I think you, I think you.

 

 


Speaker:

You mentioned this a little bit earlier, but I just want to, um, you know,

 

 


Speaker:

when you, when you said that a lot of the work would've already been done,

 

 


Speaker:

if you have a DR plan, that's great.

 

 


Speaker:

If you don't have one, uh, that's not good.

 

 


Speaker:

But, but I want to say that if this is the first time you're

 

 


Speaker:

doing any of this kind of work, the really key first thing is the BIA.

 

 


Speaker:

Right?

 

 


Speaker:

It's like.

 

 


Speaker:

Because, you know, as nerds as it people, we, we, we very often, we, we

 

 


Speaker:

focus immediately on the, you know, the cyber aspect or the recovery aspect

 

 


Speaker:

or the backup aspect and you know, how are we gonna get our network up?

 

 


Speaker:

Okay, okay.

 

 


Speaker:

We need to figure out what actually matters, right?

 

 


Speaker:

What makes the company money?

 

 


Speaker:

What's going to cost the company money when it's down?

 

 


Speaker:

Right.

 

 


Speaker:

What are things that we can do without and, and how long and

 

 


Speaker:

how long can we do without them?

 

 


Speaker:

Uh, how much money are we losing when this part of the company is down?

 

 


Speaker:

Right?

 

 


Speaker:

Um, and when this part of the company is down, is there something else that

 

 


Speaker:

the people that work on that part of the company can do to continue

 

 


Speaker:

to make money for the company?

 

 


Speaker:

Uh, or do we just send them home?

 

 


Speaker:

Um, you know, so they're not twiddling their thumbs.

 

 


Speaker:

and Curtis, when you said BIA, you meant business impact assessment, correct.

 

 


Speaker:

you.

 

 


Speaker:

Thank you.

 

 


Speaker:

What do you, what do you think, Mike?

 

 


Speaker:

Any, any additional.

 

 


Speaker:

Absolutely.

 

 


Speaker:

And so the BIA is valuable in so many ways.

 

 


Speaker:

BIA will help you on your insurance.

 

 


Speaker:

It helps you on your business continuity, your disaster recovery, your incident

 

 


Speaker:

response, all your risk assessments.

 

 


Speaker:

It's, it's very critical.

 

 


Speaker:

And any, any due diligence for like acquisitions and mergers and all

 

 


Speaker:

that stuff, it's, it's very critical.

 

 


Speaker:

It's also a good, uh, it's also a good tool for process.

 

 


Speaker:

Uh, improvement and overhead analysis.

 

 


Speaker:

Uh, it, it's, it's, it's really good.

 

 


Speaker:

Well then, uh, to touch on something you mentioned, uh, you know, if,

 

 


Speaker:

if this incident, or if this event happens and people can't do their

 

 


Speaker:

work and you send them home, or what else could they be doing?

 

 


Speaker:

Uh, that also touches on business continuity.

 

 


Speaker:

So how do we keep running the business without technology, which is really

 

 


Speaker:

what disaster recovery focuses on.

 

 


Speaker:

Business continuity is that.

 

 


Speaker:

that.

 

 


Speaker:

that contingency plan for, you know, I can't use the phone anymore or, or

 

 


Speaker:

that system's down and, and now we've gotta revert to pen and paper and,

 

 


Speaker:

uh, how do I, how do I keep taking orders or scheduling

 

 


Speaker:

repairs or whatever the case might

 

 


Speaker:

Somebody go find a big box of carbon paper.

 

 


Speaker:

Yeah, like Curtis's, uh, doctor's office or

 

 


Speaker:

that direct show that happened in the Midwest summer.

 

 


Speaker:

Remember that episode Curtis?

 

 


Speaker:

Yeah.

 

 


Speaker:

The derecho.

 

 


Speaker:

Yeah, that's a great episode.

 

 


Speaker:

We, we, we did have somebody on here who, who lived in a place,

 

 


Speaker:

um, and they experienced a derecho.

 

 


Speaker:

Have you ever even heard of a derecho?

 

 


Speaker:

I've heard the term, but I don't, I'm, I'm assuming It,

 

 


Speaker:

it's a,

 

 


Speaker:

it just means a, a hurricane that forms over land.

 

 


Speaker:

Um, don't have any idea why it's called what it's called,

 

 


Speaker:

but that's what it's called.

 

 


Speaker:

Um, so yeah, so we've done our, our business impact analysis.

 

 


Speaker:

We, you know, we, we, we know all the parts.

 

 


Speaker:

We know the.

 

 


Speaker:

We know where to focus our efforts.

 

 


Speaker:

And then we need to focus on the things that are likely to happen, the things that

 

 


Speaker:

are likely to give us the biggest impact.

 

 


Speaker:

And, you know, persona you talked about, you know, we can't do everything.

 

 


Speaker:

We talk a lot on here about good, better, best, right?

 

 


Speaker:

Good.

 

 


Speaker:

Is to have something, to have some kind of outline for anything.

 

 


Speaker:

If you have nothing, anything is better, is better than nothing.

 

 


Speaker:

On a back of an napkin is fine too.

 

 


Speaker:

Yeah.

 

 


Speaker:

Yeah.

 

 


Speaker:

Um, and the what if you've got nothing, once you've done the impact analysis and,

 

 


Speaker:

um, you've decided on, you know, we're gonna focus on, I, I think it wouldn't be,

 

 


Speaker:

it wouldn't be crazy to say we're gonna focus on a ransomware event that takes

 

 


Speaker:

out our, you know, priority one servers.

 

 


Speaker:

What would be your next step?

 

 


Speaker:

Well, I'll add some, I'll add some color to that scenario because part of

 

 


Speaker:

your analysis may, may indicate that in the event of an, of an incident like

 

 


Speaker:

that, you cannot reallocate people.

 

 


Speaker:

Those people have to keep doing whatever it is they're doing.

 

 


Speaker:

So your incident response plan should identify resources that you

 

 


Speaker:

can bring in to augment your staff.

 

 


Speaker:

And address the incident or vice versa.

 

 


Speaker:

Maybe it's your, your full-time, people addressing the incident, but

 

 


Speaker:

then you need to bring in staff, you know, some contractors to continue

 

 


Speaker:

daily operations or whatever that is.

 

 


Speaker:

Or that you've got zero capability of responding to that incident and

 

 


Speaker:

you've gotta bring in a third party, 100% to, to support and you're just

 

 


Speaker:

providing them guidance or oversight.

 

 


Speaker:

And I mean, it's, it's kind of like, uh.

 

 


Speaker:

The, the flood, the flood response, the blackman mooring or whoever it is

 

 


Speaker:

Yep.

 

 


Speaker:

where you've got a flood.

 

 


Speaker:

Nobody, I don't know how to clean up a flood or respond to a flood.

 

 


Speaker:

I know how to, I may know where the water shutoff valve is, but 100% of that

 

 


Speaker:

response is gonna be some third party.

 

 


Speaker:

And so that business impact analysis is gonna help you determine.

 

 


Speaker:

What proportion of inside, outside, you know, extra help you're gonna

 

 


Speaker:

need and who's gonna do what?

 

 


Speaker:

All right, so then, then the event happens, uh, and you're gonna, you're

 

 


Speaker:

gonna use that resource playbook depending on what that that event is,

 

 


Speaker:

um, to bring in the right, the right resources, the right people, and,

 

 


Speaker:

and start managing that response.

 

 


Speaker:

So.

 

 


Speaker:

If you'll have your playbook or your incident response

 

 


Speaker:

plan, you've executed on it.

 

 


Speaker:

You knew who the resources to pull in.

 

 


Speaker:

I'm sure along the way, as you're going through this actual event,

 

 


Speaker:

you probably see some gaps.

 

 


Speaker:

Maybe you're probably fine tuning, tweaking, adjusting, adding to

 

 


Speaker:

your incident response plan to update it so the next time it

 

 


Speaker:

happens, you're better prepared.

 

 


Speaker:

I guess the one question I have is.

 

 


Speaker:

Environments change.

 

 


Speaker:

We've always talked about it, right?

 

 


Speaker:

New systems come on board, new sites come up, new applications get deployed.

 

 


Speaker:

There are new threats out there.

 

 


Speaker:

What sort of frequency should people be thinking about going and revisiting

 

 


Speaker:

their incident response plans?

 

 


Speaker:

Because it's not helpful if, say, today, right?

 

 


Speaker:

You have an incident response plan for how to deal with telephone communications

 

 


Speaker:

from like 30 years ago, right?

 

 


Speaker:

So how do you make sure that your plans are also up to date as the

 

 


Speaker:

world changes, as your environment changes and as the people change too?

 

 


Speaker:

as a, as a good, as a good practice, good governance would be reviewing

 

 


Speaker:

all your policies, procedures, and plans at least once a year.

 

 


Speaker:

But I'll, I'll caveat that with any significant change to your personnel,

 

 


Speaker:

your environment, or the way your business operates should then dictate a

 

 


Speaker:

review of all the things that support.

 

 


Speaker:

And, uh, not only support all of those things, but also support the response

 

 


Speaker:

activity to any, any related incidents.

 

 


Speaker:

Uh, so as often as it makes sense, but at least once a year.

 

 


Speaker:

Okay.

 

 


Speaker:

And I'll, I'll add to that too, that there's often two types

 

 


Speaker:

of incident response plans.

 

 


Speaker:

There's the very technical one with the playbooks and the contact

 

 


Speaker:

information, the technical details.

 

 


Speaker:

That's for the.

 

 


Speaker:

The internal response team consumption.

 

 


Speaker:

And then there's kind of a general population incident response plan,

 

 


Speaker:

which is more like a guide to, well, how do I report stuff and what do

 

 


Speaker:

I expect?

 

 


Speaker:

And,

 

 


Speaker:

um, you know, some that, that same plan may also include a provision that says you

 

 


Speaker:

as an employee or contractor may be called upon as a subject matter expert to help.

 

 


Speaker:

Respond to an incident.

 

 


Speaker:

And

 

 


Speaker:

so putting all that, all that stuff out there as far as expectations

 

 


Speaker:

and guidance in a, in a, a shorter,

 

 


Speaker:

you know, kind of condensed manual,

 

 


Speaker:

similar disaster recovery, you know, there, there's like your evacuation plan

 

 


Speaker:

and then there's the tech, the, the, the true disaster recovery plan

 

 


Speaker:

that has a lot more detail on it.

 

 


Speaker:

I like the idea of, I, I think one of the most crucial elements, if not the very

 

 


Speaker:

first element that goes into an IR or DR plan, is the, the contact list, right?

 

 


Speaker:

Who do you call for?

 

 


Speaker:

What, who's responsible for what?

 

 


Speaker:

Um, what is Mike Sailor's cell phone number?

 

 


Speaker:

Um, you know, to, to call.

 

 


Speaker:

Because he's our guy to bring in, in the case of scenario, and again, you,

 

 


Speaker:

you, you have to update that information 'cause that stuff changes all the time.

 

 


Speaker:

Right.

 

 


Speaker:

Um, and

 

 


Speaker:

And, and don't.

 

 


Speaker:

Don't just Google Mike and his cell phone number and put it in your contact list.

 

 


Speaker:

Actually, you, you've gotta call these people and say

 

 


Speaker:

hello and

 

 


Speaker:

and you know, I'm, I'm, we need to, we need to establish a, a, a relationship or

 

 


Speaker:

a rapport so that you, you are, uh, you will answer the phone when I call you,

 

 


Speaker:

uh, and, and

 

 


Speaker:

know that it's important.

 

 


Speaker:

Yeah.

 

 


Speaker:

'cause I don't answer, I don't answer unknown, uh, phone numbers.

 

 


Speaker:

So, um, yeah.

 

 


Speaker:

Same.

 

 


Speaker:

Um, yeah, so we've got our contact list.

 

 


Speaker:

Uh, we've got our vendor list, right?

 

 


Speaker:

We've got our, um, all of tech, the technologies that are involved.

 

 


Speaker:

Um, and we've got an escalation list, right?

 

 


Speaker:

A list of what's go, who's going to be called when, and then also.

 

 


Speaker:

Who's going to be called when those people don't answer the phone?

 

 


Speaker:

Um, right, because I, I know that comes up in a, in a, um, like in a

 

 


Speaker:

tabletop, well, it comes up all the time.

 

 


Speaker:

Right.

 

 


Speaker:

Uh, Fred, who's the one that's responsible for A, B, C, uh, he's on vacation, right?

 

 


Speaker:

He, he's in Aruba.

 

 


Speaker:

Uh, good for Fred.

 

 


Speaker:

And he's taken an actual vacation and he is unplugged the cell phone.

 

 


Speaker:

And, uh, you know, and he's not taking our calls, so who's gonna take

 

 


Speaker:

Fred's call when Fred's not there?

 

 


Speaker:

That should be the case for every responsibility in the,

 

 


Speaker:

you know, in the company, right?

 

 


Speaker:

Uh, correct, and, and you should have a chart.

 

 


Speaker:

And, and if you remember from a previous episode, we call that a racy diagram.

 

 


Speaker:

That's right.

 

 


Speaker:

Yeah.

 

 


Speaker:

Uh, and spell that out again.

 

 


Speaker:

RACI,

 

 


Speaker:

responsible, accountable, consulted, and informed.

 

 


Speaker:

And so for everybody on your response team, you would, you would

 

 


Speaker:

indicate, and sometimes that changes based on what the playbook is.

 

 


Speaker:

Uh, but who's, who's, who are your primary responsible, uh, accountable

 

 


Speaker:

people for all the different types of incidents that you include, uh, in, in

 

 


Speaker:

your, in your, in your response plan.

 

 


Speaker:

Persona is the first person I call, uh, when I need to do something.

 

 


Speaker:

I don't know how to do, because I have this feeling that he

 

 


Speaker:

knows, he, he's watched a YouTube video about how to do it.

 

 


Speaker:

What does that seem, does that seem reasonable persona?

 

 


Speaker:

97% accurate, I would say.

 

 


Speaker:

he, he watches a lot of YouTube videos.

 

 


Speaker:

Um, all right.

 

 


Speaker:

So we have our, we have our, our list, our contact list, we have

 

 


Speaker:

the actual procedures, the actual runbooks that are, you know, the

 

 


Speaker:

different things that we're gonna do.

 

 


Speaker:

Uh, is there anything else that needs to go into response plan?

 

 


Speaker:

Yep.

 

 


Speaker:

So.

 

 


Speaker:

So at the, at the end of your response plan, you, you should

 

 


Speaker:

have as much reference material as you think is, uh, necessary.

 

 


Speaker:

So, you know, there's your, your instant response team contact list, but down at

 

 


Speaker:

the bottom, kind of to your point of, of third parties, but more than just

 

 


Speaker:

name and phone number, you may need an account number or a policy number

 

 


Speaker:

or, um, something specific, a pin.

 

 


Speaker:

Uh, you know, if there's, you know, multifactor, um, and then.

 

 


Speaker:

Something at the end.

 

 


Speaker:

Uh, towards the end, we have, I, I typically suggest appendices.

 

 


Speaker:

And so one of the escalation points of an incident is

 

 


Speaker:

whether or not it was a breach.

 

 


Speaker:

And the difference between incident and

 

 


Speaker:

breach can be significant

 

 


Speaker:

for a lot of different reasons.

 

 


Speaker:

What, you can get sued over a breach, right?

 

 


Speaker:

A breach might require that you, you

 

 


Speaker:

have, uh, reporting, reporting obligations to the state or.

 

 


Speaker:

What have you.

 

 


Speaker:

So then, so there's a, there's usually an appendix that helps you walk through

 

 


Speaker:

kind of a decision tree to determine if a, if an incident was a breach,

 

 


Speaker:

well then we've got all of this, you know, maybe, especially if you're a

 

 


Speaker:

publicly traded company, what are your reporting requirements, uh, by state,

 

 


Speaker:

by statute, and then some things that you want to pre, uh, pre-negotiate.

 

 


Speaker:

Is with, and this is with like management and legal or hr, how do

 

 


Speaker:

we communicate different types of incidents internally and externally?

 

 


Speaker:

And so having those predefined templates for emails or phone calls

 

 


Speaker:

already in your plan, so you're not on

 

 


Speaker:

the phone for an hour negotiating with internal audit or legal about,

 

 


Speaker:

all right, how are we gonna say this?

 

 


Speaker:

You've, you've got all that stuff outta the way.

 

 


Speaker:

So Mike.

 

 


Speaker:

So we have everything documented.

 

 


Speaker:

I think one thing we didn't cover is where does this document live?

 

 


Speaker:

Because right if, because if it's like on your normal internal systems

 

 


Speaker:

and you get hit with a ransomware attack, now your incident response

 

 


Speaker:

plans are also potentially gone.

 

 


Speaker:

If you get hit by a hurricane or a flood and you have it in

 

 


Speaker:

physical paper form in the site location, those are probably gone.

 

 


Speaker:

So.

 

 


Speaker:

How do people store these and make Sure.

 

 


Speaker:

it's still accessible?

 

 


Speaker:

I've seen a lot of variations of this.

 

 


Speaker:

I've seen the All right, who's, whose turn is it to take the metal

 

 


Speaker:

box home in the trunk of their car?

 

 


Speaker:

Uh, I've seen people store it with their tapes at Iron Mountain.

 

 


Speaker:

I've seen people, uh, uh, pay for a service where it's like a cloud-based

 

 


Speaker:

disaster recovery thing, where different stakeholders have the ability

 

 


Speaker:

to log in and update their stuff, and that's where the plan lives.

 

 


Speaker:

Uh, and then, uh, I've also seen some pretty creative, uh, approaches to this

 

 


Speaker:

with like $0 retainers with a, a law firm.

 

 


Speaker:

And so pre-negotiate, get all the paperwork outta the way.

 

 


Speaker:

And I would, I would suggest this with an instant response firm.

 

 


Speaker:

And, and even, uh, uh, you know, if, if, if your staff isn't capable of, of

 

 


Speaker:

quickly fixing or building or re-imaging stuff, then go find a, a firm that, that

 

 


Speaker:

can provide you those resources and, and get all the paperwork done today.

 

 


Speaker:

And, but to my point, uh, uh, or back to my point about the law firm.

 

 


Speaker:

So $0 retainer establishes and it gets all the deconfliction out of the way.

 

 


Speaker:

Uh, but send, give them your, your Dr and incident response plan.

 

 


Speaker:

And because you're gonna call them anyway,

 

 


Speaker:

uh, make sure that you've got their phone numbers, but you're, it's great.

 

 


Speaker:

Great point.

 

 


Speaker:

I've seen in a lot of cases where, you know, we're trying to, there's an

 

 


Speaker:

incident, we're trying to coordinate response and their networks, their

 

 


Speaker:

internet's down, their email's down and, and, you know, how do, how do we even

 

 


Speaker:

coordinate among their response team?

 

 


Speaker:

And so having a, having a relationship with someone that can.

 

 


Speaker:

That can provide you that, that communications medium, but also, uh, be

 

 


Speaker:

a, a good place to keep your, your plan.

 

 


Speaker:

Yeah, I, I, my personal preference is I like having an electronic version

 

 


Speaker:

because it's easier to maintain, but I also like having that paper version and

 

 


Speaker:

the way I like having the way I like.

 

 


Speaker:

Creating a paper version is in a loose leaf type of a notebook, so that allows

 

 


Speaker:

me, when I update a couple of pages, I can just rip out at those pages and

 

 


Speaker:

replace those pages so that I'm not printing an entire tree of documentation

 

 


Speaker:

every time I go to update the runbook.

 

 


Speaker:

Um, and I do like that idea of having it, having it stored somewhere else

 

 


Speaker:

other than the company, but close by.

 

 


Speaker:

Right.

 

 


Speaker:

If we're talking about actual paper.

 

 


Speaker:

It needs, you know, you talked about a law firm, you talked about an instant

 

 


Speaker:

response team somewhere that stuff is stored, that's accessible to us as a

 

 


Speaker:

company, but, uh, but not too accessible because it's in the data center that,

 

 


Speaker:

uh, that we're trying to recover.

 

 


Speaker:

Or at least a copy.

 

 


Speaker:

Right.

 

 


Speaker:

Store it somewhere

 

 


Speaker:

A copy.

 

 


Speaker:

Yeah.

 

 


Speaker:

Um, of course the more copies you have, the more trouble you

 

 


Speaker:

have maintaining those copies.

 

 


Speaker:

Right.

 

 


Speaker:

But the, the, um, the, uh, and I think the, the, the physical paper

 

 


Speaker:

issue is less of an issue during a cybersecurity event as it, than it is

 

 


Speaker:

in a, in a disaster where the, you know, the building blew up or was on fire.

 

 


Speaker:

But, I cannot overstate the value of, um, of a paper document, right?

 

 


Speaker:

In a, in an event that potentially takes out your, you know,

 

 


Speaker:

everything that you have, right?

 

 


Speaker:

I mean, I mean, I'm, you know, I'm a, I'm a huge fan of the

 

 


Speaker:

cloud putting stuff in the cloud.

 

 


Speaker:

Uh, what if you got no internet, right?

 

 


Speaker:

Cloud's, cloud's great, but you can't see the clouds anymore.

 

 


Speaker:

Yep.

 

 


Speaker:

Yep.

 

 


Speaker:

So off switching topics, so we have the cybersecurity incident

 

 


Speaker:

response plan, which for company documents, who all the people are,

 

 


Speaker:

how they respond, and all the rest.

 

 


Speaker:

I.

 

 


Speaker:

This is a goldmine for malicious actors, right?

 

 


Speaker:

So if they got their hands on this right, they know your entire playbook.

 

 


Speaker:

It's like if you got the military plans for like the nuclear weapons and

 

 


Speaker:

like how things will respond, right?

 

 


Speaker:

So how, like how should people go about protecting these from these bad actors?

 

 


Speaker:

So it should be considered or classified as a, a confidential or sensitive

 

 


Speaker:

document, so password protected, you know, make sure it's stored

 

 


Speaker:

appropriately with restricted access.

 

 


Speaker:

Uh, but you're right.

 

 


Speaker:

In fact, uh.

 

 


Speaker:

We did a tabletop exercise on ransomware for a, an engineering company.

 

 


Speaker:

Uh, and then shortly after the tabletop, they actually had a ransomware attack.

 

 


Speaker:

Uh, come to find out the threat actors had been in that environment for six months

 

 


Speaker:

or actually privy to the tabletop exercise and had access to their instant

 

 


Speaker:

response plan and their insurance

 

 


Speaker:

policies and all these other things, which then help them better

 

 


Speaker:

strategize and facilitate the attack.

 

 


Speaker:

And.

 

 


Speaker:

Uh, which, and they got paid, you know, they, they made several million

 

 


Speaker:

dollars off of that deal because they were, they were informed, uh, and

 

 


Speaker:

they knew what the capabilities were.

 

 


Speaker:

They knew that they were gonna be, um, ineffective at responding

 

 


Speaker:

to a ransomware attack, um,

 

 


Speaker:

Yeah.

 

 


Speaker:

sure that you, you fix all the problems identified in a tabletop exercise,

 

 


Speaker:

and this organization did not.

 

 


Speaker:

Well, I, I think that's a great question.

 

 


Speaker:

P and I think it goes back to the same thing that we advise for

 

 


Speaker:

backup systems segregation, right?

 

 


Speaker:

Making sure that it's just not on the same systems with the same usernames

 

 


Speaker:

and passwords protected by active directory and an admin and an active

 

 


Speaker:

directory admin password, right?

 

 


Speaker:

It's gotta be more than that.

 

 


Speaker:

And, and that's, and I think that's where SaaS providers can be very helpful.

 

 


Speaker:

Right.

 

 


Speaker:

Uh, I like this idea, you know, um, that you talked about Mike, of having

 

 


Speaker:

a, you know, basically services that will, that they probably have, I.

 

 


Speaker:

Templates and things that you can use for an incident response

 

 


Speaker:

plan and help build it out.

 

 


Speaker:

It makes making that easier.

 

 


Speaker:

And then also it's, it's stored in a different environment than yours.

 

 


Speaker:

Uh, of course you gotta vet all their security because persona, you are 100%

 

 


Speaker:

right, that that would be a gold mine.

 

 


Speaker:

Just like backup systems are a gold mine.

 

 


Speaker:

You get, you get in charge of the backup system and you have, you know,

 

 


Speaker:

why, why hack all the servers when I can just restore the data that I want?

 

 


Speaker:

Right?

 

 


Speaker:

Um, any final thoughts, Mike?

 

 


Speaker:

Any final things we need to say about creating an an incident response plan?

 

 


Speaker:

Yes, the design of that plan will drive its effectiveness.

 

 


Speaker:

And so, uh, from an audit perspective, um, well, even more fundamentally

 

 


Speaker:

controls perspective, an incident response plan or program would be considered

 

 


Speaker:

a control, uh, that helps drive the effectiveness of your organization.

 

 


Speaker:

I.

 

 


Speaker:

There's two parts of a control.

 

 


Speaker:

There's the design of the control, and then there's the operational

 

 


Speaker:

effectiveness of a control.

 

 


Speaker:

And so we can put this plan together.

 

 


Speaker:

We can have all these whiteboarding sessions and phone

 

 


Speaker:

calls about who's doing what.

 

 


Speaker:

And we put it all in this document.

 

 


Speaker:

We feel great about it, but it doesn't mean a thing if you don't walk through

 

 


Speaker:

it to see how effective that design is.

 

 


Speaker:

And that's, you have to do table, you have to do an exercise to test

 

 


Speaker:

the effectiveness of your plan.

 

 


Speaker:

'cause like Mike Tyson said.

 

 


Speaker:

Yeah, everybody has a plan until I hit 'em.

 

 


Speaker:

And so your response plan is, that's all it is, is a plan until, until you get hit.

 

 


Speaker:

And if you don't, if you haven't, if you haven't walked through

 

 


Speaker:

it, you're not gonna know how well you, uh, respond to that.

 

 


Speaker:

That hit.

 

 


Speaker:

Yeah, I really thought you were gonna rhyme earlier.

 

 


Speaker:

You know, you something.

 

 


Speaker:

I forgot what you said.

 

 


Speaker:

It's, uh, you don't got that thing or something.

 

 


Speaker:

I thought you were gonna rhyme there, but, you know, uh, but I, yeah, I,

 

 


Speaker:

I, I thought exactly about that.

 

 


Speaker:

That Mike, that Mike Tyson comment.

 

 


Speaker:

You know, everybody, everybody got play until they get hit in the face.

 

 


Speaker:

Absolutely.

 

 


Speaker:

All right, well thanks again, Mike for uh, walking us through

 

 


Speaker:

and thanks again for some great questions this time.

 

 


Speaker:

Persona,

 

 


Speaker:

I, I think I'm starting to think more like a bad actor, which is kind of.

 

 


Speaker:

Fun.

 

 


Speaker:

that's what you gotta do, right?

 

 


Speaker:

Gotta think like a bad actor.

 

 


Speaker:

Absolutely.

 

 


Speaker:

All right, and thanks to our listeners, we do this for you.

 

 


Speaker:

Uh, reach out to us, say hi.

 

 


Speaker:

Go to backup wrap up.com and put in a comment.

 

 


Speaker:

I love getting comments from people.

 

 


Speaker:

Um, and, uh, you know, rate us go.

 

 


Speaker:

You know, if you love us, rate us.

 

 


Speaker:

If you hate us, don't.

 

 


Speaker:

Anyway.

 

 


Speaker:

Uh, that is a wrap.

 

 


Speaker:

The backup wrap up is written, recorded and produced by me w Curtis Preston.

 

 


Speaker:

If you need backup or Dr.

 

 


Speaker:

Consulting content generation or expert witness work,

 

 


Speaker:

check out backup central.com.

 

 


Speaker:

You can also find links from my O'Reilly Books on the same website.

 

 


Speaker:

Remember, this is an independent podcast and any opinions that you

 

 


Speaker:

hear are those of the speaker.

 

 


Speaker:

And not necessarily an employer.

 

 


Speaker:

Thanks for listening.