Module IV·Article V·~1 min read

Incident Management and Recovery After Cyberattacks

Cybersecurity and Risk

Turn this article into a podcast

Pick voices, format, length — AI generates the audio

When the Attack Happens, Not If

Not "if" an attack happens, but "when". Understanding this changes the approach: from "prevent at any cost" to "prevent as much as possible + prepare for responding".

Incident Response Lifecycle (NIST SP 800-61)

1. Preparation: CIRT (Computer Incident Response Team); response plan; playbooks for typical incidents; communication chains; contacts for insurer, lawyer, PR.

2. Detection and Analysis: sources: SIEM alerts, user complaints, external notifications (partners, regulators). Assessment: scope, type, severity.

3. Containment: immediate (isolate infected systems — disconnect from network) and long-term (determine root cause, eliminate attack vector).

4. Eradication: remove malware, close vulnerabilities, change compromised credentials.

5. Recovery: gradual return of systems to operation, monitoring for re-infection.

6. Post-Incident Review: what happened? How were we breached? What did we do right/wrong? What changes are we making?

Ransomware: To Pay or Not to Pay?

Dilemma: paying the ransom — quick restoration, but: financing criminals; no guarantee of decryption; repeated attacks (you are an "easy target"). Not paying: requires reliable backups; may take weeks.

Companies with mature backup systems (3-2-1: 3 copies, 2 media, 1 offsite) can recover without paying the ransom.

Practical Assignment

A manufacturing company has become a victim of ransomware. All files are encrypted, the demand is $500,000 in Bitcoin. The company has backups that are 3 days old. (1) What is your first step? (2) Who should be notified (internal, external, regulatory)? (3) Should you pay or restore from backups — weigh the arguments. (4) How can you ensure that the attack does not recur?

§ Act · what next