What to do if a breach is experienced. Ensure the right people have the right process, subject matter knowledge and technology to conduct root cause analysis, rectification and return to normal operations plan.
The plan must cover, immediate action, DR, cyber forensic capability with provision for what people must do, who must do it, how do people do what they have to do. Technology requirements.
There is no point trying to return to normal if you have not identified the cause, the issue may just resurface.
Contact info@dmaust.com.au for more information.