United States

Incident Response Guide


Download Guide

In today’s environment, it is likely that all companies will eventually experience an information security incident. Timing is critical when diagnosing the nature and origin of the incident, and outlining the appropriate reaction. The speed and accuracy of response are important factors in addressing issues and protecting networks and systems.

To help organizations identify and respond to information security incidents, RSM has developed a comprehensive Incident Response Guide. The guide includes data privacy incident checklists, as well as key steps to take to respond to a potential breach. It also details examples, assessment questions, containment processes and where to look for evidence for a number of common incidents, including:

  • Malware intrusion
  • Internal or external unauthorized network access
  • Social engineering attacks
  • Lost or stolen computers, devices or media

The guide also includes common security and privacy assessment areas, detailing processes that organizations may fail to address when developing a data security platform. In addition, the document provides an appendix of potential evidence sources and how they can help you to identify and investigate a suspected incident. With an increasing number of threats, organizations must be prepared to respond quickly and thoroughly to minimize damage to critical systems and sensitive data.


How can we help you?

Contact us by phone 800.274.3978 or
submit your questions, comments, or proposal requests.

Receive Risk Bulletin by Email


Cybersecurity Rapid Assessment®

Complete our Cybersecurity Rapid Assessment form to be contacted about receiving our "quick-hit" evaluation of your organization’s overall security risk.




Case Studies

COSO Resource Center

Consulting Careers



Trending risk concerns for business leaders in 2020

  • February 12, 2020


On the Sarbanes-Oxley radar

  • January 20, 2020