Member-only story

Run a Data Breach Exercise

Don’t just pretend you do

Vicente Aceituno Canal
3 min readOct 23, 2023
Photo by Kyle Head on Unsplash

There are so many slices of the cybersecurity market that are overcrowed; pentest providers, anti virus, magic bullets, get-certified-in-a-box, you name it. There are, on the other hand, some needs where I have not been able to find hardly any services. One of them is cybersecurity training for software development teams, and the other Data Breach Exercises.

How do you run a Data Breach Exercise, as no one is going to do it for you? Like this:

Why

For compliance reasons you are supposed to run data breach exercises, and I would say they represent a great way to test what gaps there are and fix them well ahead of a real incident.

Who

First you need to decide who will participate. This can include a member of the Exec team, the Data Protection Officer, IT administrators, Public Relations, Human resources…

What

The final deliverable of the Data Breach Exercise is a report that should be sent to the Distribution List using the same procedures marked by the Cybersecurity Incident Procedure. The report must contain:

  • Incident Number
  • Chair
  • Reported by
  • Investigation Requested by

--

--

Vicente Aceituno Canal
Vicente Aceituno Canal

Written by Vicente Aceituno Canal

Evidence-based cybersecurity management leader

No responses yet