Business A.M
No Result
View All Result
Monday, March 2, 2026
  • Login
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
Subscribe
Business A.M
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us
No Result
View All Result
Business A.M
No Result
View All Result
Home Analyst Insight

Developing an effective incident response programme

by Admin
January 21, 2026
in Analyst Insight

No matter how prepared or no matter the number of information security controls a company possesses, a time will come when the organisation suffers a computer security compromise. It is just inevitable especially if the business runs most of its processes through a network system, online or through a third-party company. Sometimes, the incident might be a minor breach that can be quickly remediated or a major breach that might expose the company and turn into a media spotlight. Yet, many companies don’t have a methodical response when these incidents occur.

Planning in advance for incidents and various incidents helps business leaders and stakeholders decide how they will handle situations and prepare a well-thought response. Usually, an event is related to occurrences that happen to a security function within an organisation. For example, whenever a company tries to extract data from their cloud database into their Virtual Private Network there is a four second exposure which leaves room for hackers. Another example could be an administrator changing permissions on a shared folder could spring potential incidents.

The above examples might not necessarily lead to what information governance professionals call an “adverse event” but it is pertinent to record these incidents and draw lessons from them. An adverse event has negative consequences. For example, when there is a malware infection on a system or a user accesses file that he or she is not authorised to view which leads to the compromising of the information integrity. These acts violate computer security policies or a company’s acceptable use policies.

The first step to creating an effective incident response management is to create a security incident response team. These set of individuals or stakeholders will be responsible for responding to an information security incident that occur within an organisation by following the existing response procedures and incorporating subject matter expertise where needed. Usually, the team might include individuals from the IT, finance, HR, and privacy department. The formation of these team is dependent on the size of the company, and they must be able to respond to incident at any time and day.

There are four known phases in the incident response. To avoid poor decision making in the event of an incident, it is good for an organisation to embed these four phases into their incident response management plan. 

The first phase is preparation. This phase includes creating a documented policy and assigning staff members who own these policies. This requires careful preparation to ensure that the proper foundation to operational procedures that will be effective in the organisation’s information security management framework is laid.

The next phase is detection and analysis phase which requires identifying the security incident that has taken place. Quite often, these incidents are usually spotted by trained experts or analysts. There are security event indicators, according to National Institute of Standard and Technology (NIST), which includes: alerts, logs, publicly available information, and people. NIST further recommends that organisations in this phase seek assistance from external resources, capture network traffic as soon as incident is suspected, and understand normal behaviour of users, systems, networks, and applications.

The third phase is containment, eradication and recovery which primarily includes activities designed to uncover and analyse information about the incident. This stage further helps the team to take informed measures to contain the effects of the incident, where necessary eradicate the incident and recover to normal BAU activities.

The fourth phase is the post incident activity. This is where recovery effort to restore business to normal operations occur. It is a lessons-learned review session to ensure that there is a new approach towards preventing a further recurrence of the event and creating an improved business procedure to prevent the incident.

Organisation must take incident management serious as these helps them prepare to handle incidents in a methodical fashion and helps prevent incidents from spiralling out of control. It is good practise to maintain a team that manages the whole incident management response within a company.

Admin
Admin
Previous Post

Ending centuries of Africa’s exploitation

Next Post

The Naira and its exchange rate

Next Post

The Naira and its exchange rate

  • Trending
  • Comments
  • Latest
Igbobi alumni raise over N1bn in one week as private capital fills education gap

Igbobi alumni raise over N1bn in one week as private capital fills education gap

February 11, 2026

Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

November 20, 2017

How UNESCO got it wrong in Africa

May 30, 2017

CBN to issue N1.5bn loan for youth led agric expansion in Plateau

July 29, 2025

6 MLB teams that could use upgrades at the trade deadline

Top NFL Draft picks react to their Madden NFL 16 ratings

Paul Pierce said there was ‘no way’ he could play for Lakers

Arian Foster agrees to buy books for a fan after he asked on Twitter

Fresh $750m World Bank package tests Nigeria’s fiscal discipline

World Bank taps insurers for $6bn emerging markets credit push

March 2, 2026
Tech adoption outpaces skill development in emerging insurance hubs

Tech adoption outpaces skill development in emerging insurance hubs

March 2, 2026
Capital, infrastructure, ESG alignment key to unlocking Nigeria’s gas potential – Asalu MD, Zamam Offshore

Capital, infrastructure, ESG alignment key to unlocking Nigeria’s gas potential – Asalu MD, Zamam Offshore

March 2, 2026
Hormuz tensions inject fresh risk into global oil market

Hormuz tensions inject fresh risk into global oil market

March 2, 2026

Popular News

  • Igbobi alumni raise over N1bn in one week as private capital fills education gap

    Igbobi alumni raise over N1bn in one week as private capital fills education gap

    0 shares
    Share 0 Tweet 0
  • Glo, Dangote, Airtel, 7 others prequalified to bid for 9Mobile acquisition

    0 shares
    Share 0 Tweet 0
  • How UNESCO got it wrong in Africa

    0 shares
    Share 0 Tweet 0
  • CBN to issue N1.5bn loan for youth led agric expansion in Plateau

    0 shares
    Share 0 Tweet 0
  • Insurance-fuelled rally pushes NGX to record high

    0 shares
    Share 0 Tweet 0
Currently Playing

CNN on Nigeria Aviation

CNN on Nigeria Aviation

Business AM TV

Edeme Kelikume Interview With Business AM TV

Business AM TV

Business A M 2021 Mutual Funds Outlook And Award Promo Video

Business AM TV

Recent News

Fresh $750m World Bank package tests Nigeria’s fiscal discipline

World Bank taps insurers for $6bn emerging markets credit push

March 2, 2026
Tech adoption outpaces skill development in emerging insurance hubs

Tech adoption outpaces skill development in emerging insurance hubs

March 2, 2026

Categories

  • Frontpage
  • Analyst Insight
  • Business AM TV
  • Comments
  • Commodities
  • Finance
  • Markets
  • Technology
  • The Business Traveller & Hospitality
  • World Business & Economy

Site Navigation

  • Home
  • About Us
  • Contact Us
  • Privacy & Policy
Business A.M

BusinessAMLive (businessamlive.com) is a leading online business news and information platform focused on providing timely, insightful and comprehensive coverage of economic, financial, and business developments in Nigeria, Africa and around the world.

© 2026 Business A.M

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • Home
  • Technology
  • Finance
  • Comments
  • Companies
  • Commodities
  • About Us
  • Contact Us

© 2026 Business A.M