Planning for the inevitable

23 Nov 2015

Planning for the inevitable

By Charlotte Tunstall – Sales Executive – Cyber and Technology at Protection Group International

In my day to day activity, I am often asked about how an organisation should go about creating a breach response plan. After first getting over the hurdle of why one isn't in place already, or if it is, why it is never tested, the conversation can very quickly take a technical turn.

But implementing a good breach response plan goes far beyond just 'keeping the lights on'. First, you have to understand what your 'lights' are. Understand your IP. Understand where it is, who has access to it, when, and how it can be obtained. Follow guidelines already in place such as ISO27001, or if you are an SME, have a look at Cyber Essentials.

From here, start thinking about all of the ways your confidential IP can be accessed. Work with professionals such as PGI Cyber on scenario plans and most importantly, test these plans. Imagine having a fire safety plan in place and never testing it. It's rendered useless.

This all begins to formulate a breach response plan. But it goes on….. 

In the wake of a breach, when do you contact your legal representation? What do you have to tell the press? Do you have cyber insurance and does it cover your specific breach? 

We are working closely with insurance and legal firms to help organisations make the right calls at the right times when a breach occurs.

For the latest PGI updates like our pages on LinkedIn – PGIPGI Cyber and Facebook – PGIPGI Cyber

Share this article


Your free global geopolitical
risk dashboard

PGI’s Risk Portal tool provides daily intelligence feeds, country threat assessments and analytical insights, enabling clients to track, understand and navigate geopolitical threats.

The Risk Portal gives users up-to-date information and analysis on global affairs.

The Risk Portal allows users to visualise information in a unique and instantly understandable way. Mapping filters enable the visualisation of incidents by threat category, time period, perpetrator and target type.

Risk Portal users can upgrade their accounts to include the Report Builder and Country Profile Generator features. The Report Builder allows users to select information, data and images from the Risk Portal and create bespoke reports and emails.

Subscribers to PGI’s Bespoke services receive tailored analysis on specific sectors and geographies of interest, delivered at a frequency they determine.

Visit the Risk Portal

Subscribe to our Cyber Bytes Newsletter

Keep yourself in the loop with PGI by signing up to our Monthly Cyber Bytes email. You will receive updates, tips and narrative around what has been happening in the world of information security.

Get in touch today

For more information on how we can help you or your business, please contact us via:

Related News

CISMP, CISSP and CISM - what's in an acronym?

20 Mar 2017

There is a wide range of different security courses available, and a mind-boggling array of certific...

Read news article

International Womens Day - Pioneering Women in Tec...

08 Mar 2017

Pioneering Women in Technology – Katherine JohnsonThe Oscar season has been and gone. The...

Read news article

Law Firms and why they need cyber security

06 Mar 2017

Suffering a data breach can be devastating for any company but for law firms the impacts can be part...

Read news article
Back to the News Hub

Follow us

+44 (0)207 887 2699
©2017 PGI - Protection Group International Ltd. All rights reserved.
PGI - Protection Group International Ltd is registered in England & Wales, reg. no. 07967865
Registered address: Cascades 1, 1190 Park Avenue, Aztec W, Almondsbury, Bristol BS32 4FP