
Once the C-level support is obtained, the next important step is building a permanent team including security, data centers, storage, compliance, legal, risk management, professional process and internal and internal communication. Organizations need to break the silos and create an interdisciplinary group that will continue to function as an ongoing unit, constantly developing to meet new threats.
Specific roles include the incident reporter, person responsible for communicating with stakeholders; A plan manager, whose role is to ensure that everyone performs the tasks assigned to them; And an asset manager, who is responsible for securing and protecting important assets and reporting back to his position throughout the event.
Step 2: Identify the risk – and find out all your data
Identifying risk in a large, distributed enterprise is a complex function. Risks are everywhere, start with cyber attacks (including insider attacks), and include human error, system failures (hardware, software, network), natural disasters and supply chains, third-side-weaknesses associated with Cloud service providers and mother-in-law.

