Cyber Incident Response Planning Checklists

Planning Ahead Can Save Time and Money While Supporting Compliance Intiatives

DDoS ChecklistIncident response plans should be in place well before a breach, but if this isn't possible, the following basic checklists can help organize your action plan during the incident. Having a plan in place can reduce response time by hours, if not days.

Download one or all four of these Incident Response planning checklists:

  1. Incident Response Website Defacement Checklist
    During a website defacement incident, resources must be allocated quickly to avoid further loss of public image, financial damage or legal issues. This checklist includes response coordination, incident identification, incident mitigation, and ways to protect against a future attack.
  2. Incident Response DDos Checklist
    During a Distributed Denial-of-Service (DDoS) attack, having an organized response plan is crucial. The checklist includes response coordination, incident identification, incident mitigation and ways to protect organizations against a future attack. 
  3. Incident Response Malware Checklist
    When a malware infection is suspected, minutes count. The checklist includes response coordination, incident identification, incident mitigation and ways to protect organizations against a future attack. 
  4. Incident Response Ransomware Checklist
    Get organized and have an action plan. This checklist includes tasks for your response coordinator, a list on incident miigation and also incident identification.