Help Net SecurityArchived Mar 17, 2026✓ Full text saved
In this Help Net Security video, Arvind Parthasarathi, CEO of CYGNVS, walks through a 10-step process for handling a cybersecurity breach. The first five steps cover preparation: setting up an out-of-band communication platform, identifying internal stakeholders, selecting external providers like legal counsel and forensic firms, building cross-functional playbooks, and running tabletop exercises to test those playbooks. The second five steps address what to do once a breach is underway. These i
Full text archived locally
✦ AI Summary· Claude Sonnet
Help Net Security March 17, 2026 Share What to do in the first 24 hours of a breach In this Help Net Security video, Arvind Parthasarathi, CEO of CYGNVS , walks through a 10-step process for handling a cybersecurity breach. The first five steps cover preparation: setting up an out-of-band communication platform, identifying internal stakeholders, selecting external providers like legal counsel and forensic firms, building cross-functional playbooks, and running tabletop exercises to test those playbooks. The second five steps address what to do once a breach is underway. These include setting up real-time dashboards, managing access and legal privilege, gathering evidence for potential regulatory review, communicating with employees not involved in the response, and tracking compliance reporting requirements across jurisdictions. Webinar: The True State of Security 2026 More about CISO compliance cybersecurity CYGNVS data breach incident response strategy tips video Share