Question: During and after an information security breach, it is essential to communicate to stakeholders. In this discussion, evaluate and discuss a process to manage stakeholder

During and after an information security breach, it is essential to communicate to stakeholders. In this discussion, evaluate and discuss a process to manage stakeholder communication during and after an attack. Following a breach to data, managing stakeholder relationships will be critical. Look at the Blog on Crisis Communications. (Woods) List two important considerations concerning stakeholder communication during a breach. Use an example to illustrate the considerations.

Woods, A. (2016). How to Manage Stakeholders During a Cyber Attack (Links to an external site.)Links to an external site.. Retrieved from https://www.everbridge.com/how-to-manage-stakeholders-during-a-cyber-attack/

MIT Technology Review Insights. (2016, April 20). Crisis Communication After an Attack (Links to an external site.)Links to an external site.. Retrieved from https://www.technologyreview.com/s/601292/crisis-communication-after-an-attack/

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!