How to Create Your Cyber-Incident Response Plan

Any response plan worthy of being relied upon must be custom tailored to your company and regularly updated as threats, technology, and your company evolve.

July 25, 2016

You keep hearing it— it is not a matter of whether a cyber-security incident will hit your company, but when. An incident can include a number of events, such as suspicious network activity; theft or loss of physical assets like laptops, phones, or thumb drives; malware; credit card theft; phishing attempts; ransomware; or website defacement. Are you ready for any of these? Does your company have a response plan? Is it written down? Are others aware of it? Has it been tested?

First published on InsideCounsel, July 25, 2016

The articles on our website include some of the publications and papers authored by our attorneys, both before and after they joined our firm. The content of these articles should not be taken as legal advice. The views and opinions expressed in this article are those of the author(s) and do not necessarily reflect the views or official position of Robins Kaplan LLP.


Anne M. Lockner


Pronouns: she/her

Sandra Anderson

Back to Top