Incident Response Plan
Being prepared gets you a long way.
Even if you’re never attacked, a tangible, customized incident response plan will show your customers and other key stakeholders that you take cybersecurity seriously.
There are many ways a cyber incident can disrupt your organization.
It may seem onerous to plan for them all. So we will provide you with a set of policies and tactical materials to mitigate the threats to your business, prioritized by potential impact.
With this plan, you’ll have clear, tactical instructions on how to respond should you ever suffer an attack.


Service Highlights:
-
We run an Incident Response Crash Course to increase your team’s awareness of the IR process
- We host business and technology-focused Workshops to ensure strategic alignment
-
Receive a detailed Incident Response Playbook to guide your responders in high-stress situations
-
Improve your cybersecurity governance with an Incident Management Policy Pack
Create a plan to address the six major incident types with confidence:

Ransomware

Unauthorized Access

Malware

Web Application & Cloud Attacks

Phishing & Social Engineering

Denial of Service
We will prepare your team to make smart decisions under pressure
What to expect:
- 01 IR CRASH COURSE
- 02 WORKSHOPS
- 03 DOCUMENTATION
- 04 STRATEGY SESSION
Incident Response Crash Course
Workshops
Documentation
Strategy Session

You will receive:
- An Incident Response Plan, tailored to your business
- An Incident Response Playbook to aid decision-making under stress
- A templated Incident Management Policy Pack
We also offer a full suite of Penetration Testing Services and Customized Policy Packs at an additional cost.
Mirai Security is a process-focused consulting firm based in Vancouver, Canada. We are a dynamic group of cybersecurity experts with decades of experience building and operating security teams for the Canadian government, various critical infrastructure projects, the Vancouver 2010 Winter Olympics, and more.
In addition, we hold a rare engineering designation in the cybersecurity space, so our clients get novel insights and a proper, engineering-style approach to their enterprise network and data security.
Cybersecurity is a fluid, complex field, and we’ve spent 30 years figuring it out so you don’t have to.