What to do if you get hacked or suffer a breach

In this East Midlands Cyber Security Forum event we looked at what to do if you get hacked or suffer a breach within your business.

This event originally took place on 19th October 2017 at the University of Nottingham and was sponsored by Air-IT.

EMCSF event artwork

Through a series of presentations and a panel discussion, delegates were guided through the fundamentals of cyber incident response by considering: the practical steps they need to take; the resources required to get the situation under control, following a breach; the importance of formalising roles and responsibilities in responding to incidents; and, the relative merits of outsourcing incident response to external suppliers.

Moreover, in a changing regulatory environment, businesses increasingly need to factor actions, such as notification timescales, into their response plans alongside the traditional recovery operations. We also looked at the current, and future legal obligations placed on businesses, how these impact upon a business’ recovery plan, and how businesses’ response to incidents impacts on criminal investigations.

The key takeaways from the evening

Kevin Spencer, Marketing Communications Manager at Nexor, discusses the key takeaways from the evening to prepare your business for a hack or a data breach.

Changing legislative landscape: DPA v GDPR / NIS

Fraser Levey, Senior Manager, Cyber Security, Public Sector & Healthcare at KPMG LLP

Fraser Presenting
Fraser Levy presenting at EMCSF ‘What to do if you get hacked’ event

Fraser started the evening comparing the Data Protection Act (DPA) to the new General Data Protection Regulation (GDPR). He discussed the ins and outs of the GDPR and highlighted what businesses should look out for when it becomes law in May 2018. Fraser also identified 3 key security objectives and principles:

  • Having appropriate organisational structures, policies, and processes in place to understand, assess and systematically manage security risks to the network and information systems;
  • Having proportionate security measures in place to protect essential services and systems from cyber attack;
  • And having capabilities to ensure security defences remain effective and to detect cyber security events affecting, or with the potential to affect, essential services.

Cyber Crime – Who do you call?

Rob Pugh, Cyber Crime Team at East Midlands Special Operations Unit

Rob looked at who the first people you should call when suffering a data breach or a hack. He also explained how the first response unit deals with attacks and the practical steps to take.

What to do when you get hacked or suffer a breach

Sam Reed, Chief Technology Officer (CTO) at Air-IT

Sam talked about some use cases of data breaches and hacks and explained the importance of planning, cyber hygiene and recovery plans.

Here are the general slides from the evening, which include background information on the supporting organisations and details of upcoming events in the region: