The First Step Following a Security Breach? Establish Secure Communications

Every day security breaches are publicized in the media. Hackers don’t seem to discriminate between different sized organizations or various industries. Regardless of whether an  organization is large or small, whether it’s a government organization or financial, legal, healthcare or retail establishment, security breaches occur regularly.

When an organization discovers it has been hacked, the natural first steps are to communicate with various important stakeholders to start getting their arms around the incident and begin the process of remediating it technically and beyond.

A proper response to any cyber incident includes the following stakeholders:

  • Cybersecurity team
  • Outside incident response team
  • Business executive management (CEO, CFO, COO)
  • General Counsel
  • Outside counsel
  • The Board of Directors
  • Public Relations and media communications firm

Assembling this cross functional and inter-organizational team is the only way to ensure a well-developed and executed incident response strategy following the breach.

Frequently however, when an organization discovers a breach, and begins the incident response, the hackers are still inside the network. Systems are shut down and employees are reduced to pen and paper in an effort to shut the hacker out from gaining any additional information. Communications between these stakeholders becomes difficult if not impossible.

The only way to ensure secure communication across the stakeholders, is by not relying on traditional corporate communications since they may be compromised. If your organization is “owned,” any communications whether email, phone calls, cell phone calls or text messages may be intercepted by the hackers, providing them with valuable intelligence about your response strategy and tactics.

Moreover, traditional communications do not enable secure inter-organizational teams.

The only approach in these situations is to use an easy to use and readily available “out of band” secure communications solution that supports inter-organizational communities of interest.

Security Breach Incident Response Secure Communications

KoolSpan’s TrustCall provides secure communications, between communities of interest; including cross-functional and inter-organizational teams. It is not only secure, but also readily available and easy-to-use. TrustCall secures mobile communications including phone calls and text messages, enabling stake holders to speak and send messages even when the network is infected.

For more information, download the data sheet, or contact KoolSpan.

Security Breach Incident Response

Elad Yoran
Elad serves as Executive Chairman of KoolSpan and CEO of Security Growth Partners. His cyber experience spans executive leadership, several-time successful entrepreneur, investor, and advisor. He is an advisor at the Army Cyber Institute (ACI), director of the Cloud Security Alliance New York Chapter, and previously on the FBI IT Advisory Council. Elad authored the Internet Security Threat Report, briefed to Congress and was recognized as “Entrepreneur of the Year” by E&Y. His entrepreneurial experience includes Riptech, a managed security services firm acquired by Symantec; MediaSentry, a provider of anti-piracy technology acquired by SafeNet; Sentrigo, a database security firm acquired by McAfee; and Vaultive, a cloud encryption company. Elad was also a strategic investor/advisor to NetWitness (acquired by RSA), ThreatGrid (acquired by Cisco), and Insightix (acquired by McAfee). Elad also served as VP Global Business Development at Symantec. He served as a US Army officer and is a veteran of Operation Restore Hope in Somalia. Elad is a graduate of the Wharton School and West Point. Elad also serves as Director at Infinidat and Red Owl Analytics.
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text.