YOU’VE BEEN BREACHED — NOW WHAT?

Incident response: how to respond to a worst-case cyber scenario

GET THE REPORT

Information submitted on this form may be associated with other information we have collected and used pursuant to our Privacy Notice.

Highlights from the Report:

  • How to collect and preserve data after a breach so that critical forensic information can be retrieved
  • Internal communication and coordination plans to help ensure key players are informed
  • Guidance on long-term planning that includes proactive measures to stop the next breach
CrowdStrike Services Cyber Front Lines Report