Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Leadership and ManagementCybersecurity News

Combating Complacency: Getting the Most Out of Your Data Breach Response Plan

Not only does a data breach plan need to be in place, it also needs to be dynamic and highly flexible.

By Michael Bruemmer
Michael Bruemmer

Michael Bruemmer

January 1, 2017

This fall, the Ponemon Institute released its Fourth Annual study, Is Your Company Ready for a Big Data Breach? on data breach corporate preparedness, which revealed that 52 percent of companies experienced data breaches just this past year alone. This number has gradually increased from 33 percent in 2013 and is impacting all sizes of organizations across all industries. The growing threat has made cybersecurity a top priority for many companies, as they know it is no longer a matter of if, but when a breach will occur. The good news is that most companies (82 percent) have taken the first step in preparing for an incident by creating a data breach response plan. The bad news, however, is that these organizations are not confident in the effectiveness of their plan, with only 42 percent of respondents who said their plan was effective or very effective.

This lack of confidence highlights the need for companies to move beyond just a plan, to a dynamic program that considers the ever-changing world of cybersecurity. Over the past four years that Experian has partnered with the Ponemon Institute to conduct this study, several areas of preparedness where we expected to see growth have largely remained stagnant. This lack of advancement indicates a level of complacency that is certainly concerning.

Working on several hundred data breaches this year alone, we have noticed a few areas where complacency seems to be consistent across the board, and these areas are also consistent with the data from this year’s report. By understanding, as well as acting upon the following list of areas of complacency, companies can start more effectively preparing for a major security incident.

 

Keeping Up With Emerging Threats

The landscape of cybersecurity is continually evolving – from emerging risks such as ransomware to new regulations and case law. While breach response plans cannot reasonably be adjusted to meet every change, companies must take measures to ensure they have a process for updating their response plan that considers this dynamic environment and the new developments most likely to impact them.

As threats continue to evolve, I expected to see the number of companies updating their plan on a regular basis to grow. However, 38 percent of companies still have no set cadence for reviewing or updating their response plan. This is only a three-percent change from 2014, when 41 percent of respondents had no set cadence. Even more alarming, almost a third (29 percent) of companies surveyed have never reviewed or updated their plan.

To manage a response effectively and confidently, plans should be living documents that are frequently updated, and companies should consider a set schedule for reviewing and updating their plan. To assist in this process, they can ask outside cybersecurity experts for regular briefings on the latest legal and technical developments that should be incorporated. These experts are on the front lines of responding to major incidents and are able to provide real-world examples that should be taken into account. Complacency in this area can be extremely dangerous for companies, leaving them open to new security and financial risks.

 

Practicing Plans To Ensure Preparedness

Just as companies practice for natural disasters like fires, they should practice for cybersecurity threats. Practicing for a breach is a well-known tactic to ensure response plans are relevant and that the response team is ready to take action. Unfortunately, a third (32 percent) of respondents said their company does not practice its response plan. Of the companies that do not practice their plan, 76 percent don’t because it is too difficult to schedule and 64 percent say that it is not a priority.

On a positive note, while 68 percent of companies are taking the initiative to practice their response plan, the survey clearly showed that the definition of “practice” is not the same across organizations. In fact, the most common type of practice (73 percent) was a review of the plan by the person responsible for data breach response. Companies must move beyond reviewing the plan, to hosting drills. For companies looking for guidance on conducting a drill, Experian’s latest free Data Breach Response Guide provides an overview.

 

Gaining Third-Party Support Through Cyber Insurance

Lastly, despite a 28-percent increase in the number of organizations that have cyber insurance over the past four years, only 38 percent of companies have a data breach or cyber insurance policy. The largest increase of companies with insurance occurred between 2013 and 2014, from 10 percent to 26 percent, with only small increases during the years following.

A lack of cyber insurance, and the financial protection it provides, may be why 73 percent of respondents were not confident in their organization’s ability to minimize the financial and reputational consequences of a material breach. With the risk of litigation increasing and settlements from class action lawsuits on the rise, cyber insurance is a critical component of preparedness. Not only does it often cover legal defense costs and settlements, it provides access to experts who can help companies navigate a breach and manage the response.

If there is one thing the past four years have showed us, it is that data breaches are not going away. If anything, they are becoming more complicated. Companies cannot afford to let complacency set in. Almost all the companies we work with consider cybersecurity a top priority, and have invested time and resources into developing a plan. Taking the additional steps to ensure their plan is current, practiced and backed by third-party support can help them get the most out of the plan and respond to any security incident in an effective manner.

KEYWORDS: cybersecurity planning data breach data breach costs security awareness security complacency

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Sec0416 data slide2 900px

Michael Bruemmer, CHC, CIPP/US, is Vice President with the Experian® Data Breach Resolution group. With more than 25 years in the industry, Bruemmer brings a wealth of knowledge related to business operations and development in the identity theft and fraud resolution space where he has educated businesses of all sizes and sectors through pre-breach and breach response planning and delivery, including notification, call center and identity protection services. Bruemmer currently resides on the Ponemon Responsible Information Management (RIM) Board, the Information Security Media Group (ISMG) Editorial Advisory Board and the International Association of Privacy Professionals (IAPP) Certification Advisory Board.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Business Risk of Data Breaches: Preparing Your C-Suite

    See More
  • Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Dispelling the Dangerous Myth of Data Breach Fatigue

    See More
  • Top 5 Fails from Companies Preparing for and Responding to a Data Breach

    See More

Related Products

See More Products
  • 1119490936.jpg

    Solving Cyber Risk: Protecting Your Company and Society

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing