Hacked! What’s Your Plan?

Wednesdays with Woodward® webinar series

June 8, 2022

Wednesday 1:00 p.m.-2:00 p.m. ET

This cybersecurity education program is proudly presented as part of the Travelers Institute’s Cyber: Prepare, Prevent, Mitigate, Restore® initiative, which promotes dialogue and education to help leaders prepare for and respond to cyber incidents.

Wednesdays With Woodward webinar series logo
Cyber: Prepare, Prevent, Mitigate, Restore

If your organization suffers a cybersecurity incident, will you know how to respond? Who will you notify? How will you contain the breach? Putting an incident response plan in place, and testing it before you need it, is one of the basic tenets of good cyber hygiene. Yet many businesses report failing to do so, according to the Travelers Risk Index. Travelers’ Enterprise Cyber Lead Tim Francis and Arete’s Charlie Platt provided practical tips and an overview of key considerations when putting an incident response plan together.

Summary

What did we learn? Here are the top takeaways from “Hacked! What’s Your Plan?” 

Cyberattacks can happen to any business — any way, anywhere, anytime
“It’s not if, but when,” warned Charlie Platt, Arete’s Senior Director of Forensics. “But I like to take it one step further and say; it’s not just when, it’s how bad is it going to be?” According to Tim Francis, Travelers’ Enterprise Cyber Lead, many take the risk seriously. “Despite all other things [going on in the world], cyber remains the number one concern across the businesses we survey,” Francis said. 

Ransomware attacks have increased over 150% — but typically only account for a third of claims. “It’s the main issue that’s making headlines. But it’s just one of many attacks that might occur,” noted Francis. Acknowledging other common cybercrimes, like social engineering fraud and business email compromise, he stressed that “there’s a host of other things that an incident response plan can help you address.”
 
Prevention is the best defense. According to Francis, multifactor authentication (MFA) — which requires a combination of something you know (like a username and password), something you have (like a specific device) and something you are (like a thumbprint) to verify the legitimacy of account access attempts — can prevent 99.9% of attacks. “It's usually cheap, it's often easy and it's very effective,” he noted, recommending that every company deploy MFA as their first line of defense.

Having an incident response plan in place to mitigate the risk associated with an attack or breach is important, too. “Your incident response plan is really a business continuity plan or a disaster recovery plan. It just happens to be a disaster that happened within your information systems,” remarked Platt. He and Francis offered these tips for creating the cyber portion of your business’ continuity plan: 

  • Make good cyber hygiene part of your plan. Maintaining organization and control of your IT assets is key. To that end, Francis recommends your incident response plan include strategies for keeping systems up-to-date, backing up data regularly and using endpoint detection and response (EDR) technology.
  • Identify and prioritize your business risks.“Understand which systems actually control and run the business and are critical, and which ones are secondary so that, when you do have an incident, you know which ones to prioritize,” said Platt.
  • Have a communication strategy that includes multiple means of contact. Know who you need to contact, and in what order you need to contact them – including critical internal personnel, as well as insurance, law enforcement, supplier, client and media partners. Store multi-channel contact information for each resource (personal and work emails; mobile, office and home phone numbers) both within and outside of your company’s systems, which may be compromised.
  • Determine how and who will be responsible for collecting evidence. While containing the situation as soon as possible is crucial, so is gathering evidence. “These two are usually competing interests,” noted Platt. “Preserving evidence is going to take time, and it needs to have a system that is active and live.” It’s a balancing act, so knowing how evidence will be collected in advance helps maximize the effort while minimizing the risk.
  • Know who will get back-ups ready to come back online. “Ultimately, the goal is to get everything back up and running,” said Pratt. “Have all this in place… who’s getting backups ready to come back online, so that you can restore to a known good state.”
  • Develop and document a practical plan that meets your business’ specific needs – then practice and update it regularly. “It’s a project. It’s not just a single document,” said Platt. “The problem with using a template is it seems to imply that incident response planning is a single document, and really incident response planning is a process.”
  • Have a paper copy of your plan at the ready.“If you’ve got ransomware, that document on your computer may be encrypted. You may not have access to it,” noted Platt. “You’ve got to have a physical document that you can reach up and put your hands on.”

Getting back to business with limited impact after an attack is only one benefit of having a plan. 
“Your incident response is your checklist… to make sure you’ve covered all your bases,” noted Platt. “But it also shows your partners, your suppliers and your clients that you took this seriously, that you had a plan, that you’ve done your due diligence.”


Presented by the Travelers Institute, the MetroHartford Alliance, the American Property Casualty Insurance Association and the Master's in Financial Technology (FinTech) Program at the University of Connecticut School of Business

Watch replay

Speakers

 Tim Francis headshot  
Tim Francis
Vice President, Enterprise Cyber Lead, Travelers

  Charlie Platt
Charlie Platt
Senior Director, Forensics – Incident Response – Solutions, Arete

Host

Joan Woodward headshot
Joan Woodward
President, Travelers Institute; Executive Vice President, Public Policy, Travelers


four-panelists-seated-on-stage-at-event.png

Events & webinars

Don't miss other upcoming programs in the Wednesdays with Woodward® series.

Close up picture of businessman using keyboard

Join our email list

Get on the list to receive program invitations, replays and more.