Incident Response Planning: From Zero to Board-Ready in 90 Days | Lorikeet Security Skip to main content
Back to Blog

Incident Response Planning: From Zero to Board-Ready in 90 Days

Lorikeet Security Team March 8, 2026 12 min read

Most Incident Response Plans Fail Before the Incident Starts

Here is the uncomfortable truth about incident response: the plan you wrote two years ago and filed in a shared drive is not going to save you when ransomware locks your production database at 3 AM on a Saturday. Every organization we assess has some version of an IR plan. Almost none of them have one that would actually work under pressure.

The gap between having a plan and having a functional, tested, board-reportable incident response capability is where most organizations live. That gap is where breaches escalate from containable events into business-ending catastrophes. The 2025 IBM Cost of a Data Breach report found that organizations with tested IR plans spent an average of $1.49 million less per breach than those without one.

This guide walks you through building a real incident response program in 90 days -- one grounded in the NIST framework, tested through tabletop exercises, and structured to give your board and your customers confidence that you can handle whatever comes next.

Why 90 days? Because that is the window most organizations have between deciding they need IR capability and facing their next audit, board meeting, or customer security questionnaire. It is tight, but it is enough to build something real if you prioritize correctly.


The NIST Incident Response Framework: What It Actually Requires

NIST SP 800-61 (Computer Security Incident Handling Guide) defines the standard framework that most compliance regimes -- SOC 2, ISO 27001, PCI DSS, and HIPAA -- either directly reference or map to. Understanding these four phases is not optional. It is the vocabulary your auditors, insurers, and legal counsel will use.

Phase 1: Preparation

Preparation is everything that happens before an incident occurs. This is where 90% of your IR program investment goes, and it is where most organizations under-invest. Preparation includes:

The preparation phase never ends. It is a continuous cycle of improvement driven by lessons learned from exercises and real incidents. Organizations that treat preparation as a one-time project end up with stale plans that fail under pressure.

Phase 2: Detection and Analysis

Detection is where your continuous monitoring program meets your IR plan. When an alert fires, someone needs to determine whether it is noise, an event worth tracking, or an active incident requiring response. This phase covers:

The biggest failure mode in this phase is slow escalation. Teams that spend hours investigating before declaring an incident lose containment time they cannot get back. Your plan should define clear thresholds: if you see X, escalate immediately. Do not wait for certainty.

Phase 3: Containment, Eradication, and Recovery

Once an incident is confirmed, the priority shifts to stopping the damage, removing the threat, and restoring normal operations. NIST breaks this into three sub-phases, but in practice they often overlap:

Critical decision point: Containment often requires trade-offs between business continuity and security. Taking a production system offline stops the attacker but also stops revenue. Your IR plan must define who has authority to make that call and under what conditions. This is not a decision for the on-call engineer alone.

Phase 4: Post-Incident Activity

The most neglected phase. After the adrenaline fades and systems are restored, teams want to move on. But post-incident activity is where your IR program actually improves. This phase requires:


Building Your IR Team: Roles That Matter

An incident response plan without clear role assignments is a document, not a capability. Every organization -- regardless of size -- needs these roles defined. In smaller companies, one person may fill multiple roles. The important thing is that everyone knows their responsibilities before an incident occurs.

Role Responsibilities Who Typically Fills It
Incident Commander Overall coordination, decision authority, resource allocation, stakeholder communication CISO, VP of Engineering, or Head of IT
Technical Lead Directs technical investigation, containment, and recovery activities Senior security engineer or principal engineer
Communications Lead Manages internal and external messaging, customer notifications, regulatory filings Head of communications, legal counsel, or CEO at startups
Scribe Documents all decisions, actions, and timeline entries in real time Any team member not in a primary response role
Subject Matter Experts Provide deep knowledge of specific systems, applications, or infrastructure Application owners, database admins, cloud architects
Legal Counsel Advises on notification obligations, privilege, regulatory requirements, law enforcement General counsel or outside privacy attorney

For startups and smaller organizations that cannot staff all these roles internally, the answer is not to skip them. It is to establish external relationships in advance. A startup IR playbook needs to account for the reality that your security team might be one person -- or zero people.


Communication Templates: What to Have Ready Before You Need Them

During an active incident, nobody writes well. Stress, time pressure, and legal anxiety combine to produce either over-sharing that creates liability or under-sharing that erodes trust. The solution is pre-approved templates that your legal and communications team have reviewed before any incident occurs.

Templates You Need on Day One

Each template should include placeholders for incident-specific details, a review/approval workflow, and guidance on which communication channels to use. Do not send breach notifications over the same email system that may be compromised.


Tabletop Exercises: How to Test Without Breaking Anything

A tabletop exercise is a discussion-based simulation where your IR team walks through a hypothetical incident scenario. No systems are touched. No production workloads are affected. The value comes from forcing your team to think through decisions, identify gaps in the plan, and practice coordination under simulated pressure.

Running an Effective Tabletop Exercise

The exercise facilitator presents a scenario in stages, with each stage introducing new information or complications. After each stage, the team discusses what they would do, who they would contact, and what decisions they would make. A good exercise takes 90 to 120 minutes and covers:

  1. Initial detection -- An alert fires or a report comes in. Who gets notified? How quickly?
  2. Escalation and classification -- Is this an incident? What severity? Who makes that call?
  3. Containment decisions -- The scope expands. Do you take production offline? Who authorizes that?
  4. External communication -- A journalist calls. A customer asks about the outage on social media. What do you say?
  5. Recovery and closure -- Systems are restored. What happens next? Who writes the report?

Scenario Ideas for Different Threat Types

Scenario Tests Recommended Frequency
Ransomware Backup integrity, containment speed, payment decision authority, law enforcement coordination Annually
Data Breach Notification obligations, customer communication, regulatory filing, forensic preservation Annually
Insider Threat HR coordination, legal privilege, evidence preservation, access revocation speed Annually
Supply Chain Compromise Third-party communication, scope assessment, vendor risk management activation Every 2 years
Cloud Account Compromise Cloud provider coordination, key rotation, cloud-specific containment procedures Annually

Document the findings from every exercise. The gaps you identify become the improvements that make your next exercise -- and your next real incident -- go better.


IR Retainers: When to Bring in External Help

An incident response retainer is a pre-negotiated contract with a security firm that guarantees availability and response times when you need forensic investigation, malware analysis, or additional incident handling capacity. Think of it as insurance for your incident response capability.

When a Retainer Makes Sense

What to Look for in a Retainer

Do not wait until you need one. Negotiating an IR retainer during an active breach means paying emergency rates with no SLA guarantees. Firms prioritize retainer clients. Everyone else goes into the queue.


The 90-Day Implementation Roadmap

Here is the concrete plan for going from zero to a board-ready IR program in 90 days. This assumes you have at least one person who can dedicate 40% of their time to this effort, plus executive sponsorship to unblock decisions.

Days 1-30: Foundation

Days 31-60: Operationalization

Days 61-90: Validation and Board Readiness


Board Reporting: Translating Technical Readiness Into Business Confidence

Your board does not care about YARA rules or memory forensics tools. They care about three questions: Are we prepared? How fast can we respond? What is our exposure? Your IR reporting to the board should answer those questions concisely.

Quarterly Board IR Metrics

Present this as a one-page dashboard, not a 30-page report. Boards that receive clear, consistent security reporting make better risk decisions and provide stronger support when you need budget for improvements.


Common Mistakes That Undermine IR Programs


How This Connects to Your Broader Security Program

Incident response does not exist in isolation. It connects to every other security capability in your organization. Your zero trust architecture limits blast radius. Your vulnerability management program reduces the attack surface. Your access management processes ensure compromised credentials have limited reach.

For organizations building their security program holistically, Lorikeet Security's Defensive Security Bundle ($39,500/yr) includes IR planning, SOC-as-a-Service for continuous monitoring and detection, and threat intelligence to inform your preparation efforts. It is designed for organizations that need detection-through-response capability without building a full internal SOC.

If you need offensive validation alongside your defensive program -- penetration testing to verify your detection rules actually fire, social engineering assessments to test your human response, and red team exercises to probe your perimeter -- the Full Stack Bundle ($99,000/yr) combines offensive and defensive capabilities with compliance support.

Ready to Build an IR Program That Actually Works?

Lorikeet Security helps organizations build incident response programs grounded in the NIST framework, tested through realistic tabletop exercises, and ready for board-level scrutiny. Stop hoping your plan works and start proving it.

-- views
Link copied!
Lorikeet Security

Lorikeet Security Team

Penetration Testing & Cybersecurity Consulting

We've completed 170+ security engagements across web apps, APIs, cloud infrastructure, and AI-generated codebases. Everything we publish here comes from patterns we see in real client work.

Lory waving

Hi, I'm Lory! Need help finding the right service? Click to chat!