Putting Your Incident Management...
Putting Your Incident Management Playboo...

Putting Your Incident Management Playbook Into Action: Part 2 – Investigate

clock2 Min Read

Featured Image

Putting Your Incident Management Playbook Into Action: Part 2 – Investigate

Throughout this series, we are highlighting how an incident management playbook can become a valuable tool when it comes to reacting to a security incident or data breach. In the first part of the series, we looked at how to prepare for an incident but what happens once an incident is detected? The answer is to investigate. When an incident is identifiedinvestigating is a crucial first step in understanding what has happened, how your organization will respond to the event, and the level of damage caused. 

Investigate the Incident

Once your organization has prepared for a security incident or data breach, the next step will be putting the incident management playbook into action by investigating.

In this video we explore:

  • Determining the extent and severity of the incident
  • Identifying the laws and regulations that could apply to the incident
  • Defining risk factors and any previously taken mitigation steps that this incident bypassed
  • Prioritizing and routing incidents to the relevant teams and individuals 

Further resources for incident management: 

Follow OneTrust on LinkedInTwitter, or YouTube for the latest on incident management.

Tags:

incident management
investigate

You Might Also Be Interested In


DEC 14, 2021
Cookie Consent

Cookies & Tech 2021 Round-Up: Italy, California, Global Privacy Control, Third-Party Cookies & More

DEC 16, 2021
Consent and Preferences

Capture, Govern, Activate: How to Build a Powerful Marketing Data Strategy in 2022

NOV 22, 2021
Privacy Management

5 Steps to Automating FOIA Requests

NOV 19, 2021

5 Ways to Automate IT Risk Management

DEC 14, 2021
GRC

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like

DEC 09, 2021

Enhancing Privacy Accountability Through More Effective IT Risk Management

NOV 18, 2021
Consent and Preferences

The Digital Privacy Experience

NOV 18, 2021
PIPL

China PIPL: Managing & Responding to Data Breaches Under PIPL

BackToTop
Onetrust All Rights Reserved