Skip to main content

Solution

Cyber Incident Response Plan

Respond and recover quicker from cyberattacks with a comprehensive incident response plan

Identify

Identify and validate cyber incident response procedures. 

Uplift

Uplift response procedures with a best-for-you plan

Recover

Recover and restore to “business-as-usual” operations quicker

Marsh’s team of cyber risk advisors can create a best-for-you incident response plan, so that you can respond and recover from attacks quicker.

As cyberattacks increase in both volume and sophistication, many businesses are adopting a “when, not if” approach to cybersecurity.

Now, more than ever, proactive planning is critical to effectively and efficiently respond to and recover from a cyberattack. Having an appropriate framework to respond and recover from attacks, will help avoid chaos and stress.

Why is it important to have a Cyber Incident Response Plan?

Identifying your resilience plan in the event of a cyber incident will allow you to develop your response procedures, reducing the impact of a cyber incident on your business activities.

Businesses must evaluate the potential impacts of a cyberattack, and be prepared to pivot their operations, assets, and people in its aftermath. Thoughtful planning can help ensure your organisation has the right strategies, processes, and communications in place during a crisis.

How it works

Marsh’s team of cyber risk advisors can help develop or update your incident response plan in line with today’s best practices based on real world events.

Using our experience in managing cyber incidents we are able to review your existing response procedures and business continuity documentation, as well as carrying out a workshop with your key stakeholders to understand your vulnerabilities and agree on cyber scenarios to build response procedures around.

Part of planning for the impacts of a potential cyberattack can also include testing the plan. Marsh will run through and simulate scenarios to develop an appropriate plan.

The output is a Cyber Incident Response Plan with a set of concise response procedures for key cyber risks. A best-for you plan designed and tested to enable your business to respond, recover and restore to business-as-usual operations quicker.

Respond and recover from attacks quicker

By working with our team of cyber risk advisors your organisation will be able to adopt a set of concise response procedures for key cyber risks.

Focused on the core elements of incident response from incident detection and triggering to business impact mapping, communication strategies and longer term business recovery– enhancing your response time and minimising the impact of an attack.

Cyber Incident Response Plan from Marsh Cyber Advisory

FAQs

A cyber incident response plan is a set of instructions that helps an organisation to identify, respond to and recover from cybersecurity incidents.

A cybersecurity incident response plan includes the security measures that an organisation should follow to respond to a cyberattack as it happens. The plan is broken up into 3 segments

  • Pre-incident: the plan documents the tools, resources and  personnel required to react to the incident
  • Incident response: the main segment that lists the step by step approach to be taken in response to an incident and restore the organisation back to regular business operations.
  • Post-incident: This segment documents the requirements for incident forensics and investigation to identify the failures that resulted in the incident occurring and the lessons learnt during the incident response stage.

Why Marsh

As experts in enterprise and cyber risk, we help you take an enterprise wide, scalable approach in building your cyber resilience.

Together, we identify your risks, and develop a best-for-you program and team of partners to help manage it.

Informing your approach and decision-making process with our 25 years of cyber expertise and data-driven insight.

So that your path to cyber resilience is more productive and predictive; and your outcomes are more efficient and effective.

Article

Cyber resilience: 12 key controls to strengthen your security

Take practical steps to build your cyber resiliency with Marsh’s series on the 12 recommended cybersecurity controls, including their characteristics and requirements.

Our people