Question: During and after an information security breach, it is essential to communicate to stakeholders. In this discussion, evaluate and discuss a process to manage stakeholder
During and after an information security breach, it is essential to communicate to stakeholders. In this discussion, evaluate and discuss a process to manage stakeholder communication during and after an attack. Following a breach to data, managing stakeholder relationships will be critical. Look at the Blog on Crisis Communications. (Woods) List two important considerations concerning stakeholder communication during a breach. Use an example to illustrate the considerations.
Woods, A. (2016). How to Manage Stakeholders During a Cyber Attack (Links to an external site.)Links to an external site.. Retrieved from https://www.everbridge.com/how-to-manage-stakeholders-during-a-cyber-attack/
MIT Technology Review Insights. (2016, April 20). Crisis Communication After an Attack (Links to an external site.)Links to an external site.. Retrieved from https://www.technologyreview.com/s/601292/crisis-communication-after-an-attack/
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
