- Complete risk assessments for executive review, operational process and third-party vendors
- Review security best practices and validate your organization’s adoption or reasoning for not adopting
- Audit your data and review your data stewardship practices including data lifecycle management
- Complete a review of insurance needs including exclusions and pre-approval of coverage for any third-party services (such as cyber forensics, remediation provider, PR firm, etc.)
- Establish and regularly test an end-to-end incident response plan including empowering 24/7 first-responders
- Establish/confirm relationships with data protection authorities, law enforcement and incident service providers
- Review and establish forensic capabilities, procedures and resources (internal and third-party providers)
- Develop communication strategies and tactics tailored by audience (e.g., messages to employees vs messaging to media vs notifications to customers)
- Review remediation programs, alternatives and service providers
- Implement ongoing employee training for incident response
- Establish employee data security awareness and ongoing education on privacy, incident avoidance (password practices, how to recognize social engineering, etc.) and incident response
- Understand regulatory requirements, including relevant international requirements
Best Practices: Cyber Incident Response Readiness
Related Resources
Rebuilding Trust
4 December 2025
Policy Brief: Age Restrictions and Online Safety
While often well-intentioned, policies requiring age checks create risks for people’s privacy, security, and access to an open Internet.
Rebuilding Trust
22 May 2024
How Bill S-210 Puts Canadians’ Security and Privacy at Risk by Harming the Internet
Canadian Bill S-210 includes requirements that could disrupt essential functions of the Internet and ultimately harm Canadians’ security and...
Rebuilding Trust
10 October 2023
How to Talk to Your Manager About Memory Safety
Learn about memory safety, memory-safe languages, common bugs and vulnerabilities, and the reasons for memory safe language adoption and...