Career Insights with Upasana Gupta

Breach Response: The Right Words

What to Say in the Wake of an Incident

Is there an ideal message a senior executive can deliver amidst breach response?

See Also: Live Webinar | Navigating Identity Threats: Detection & Response Strategies for Modern Security Challenges

The recent breach of Global Payments Inc. and the subsequent CEO's response to the incident raise this question.

Global is the seventh-largest U.S. payments possessor, handling billions of credit and debit card transactions between merchants, banks and consumers. On March 30, Global announced an identified breach in its processing system, involving an estimated 1.5 million accounts. On April 2, CEO Paul Garcia discussed the breach during a conference call with market analysts and journalists.

"We are making significant progress in defining and rectifying the event," Garcia said, describing the breach as "contained." He later said about the incident: "This is manageable ... we will get through this."

I am no PR expert, but I wonder if this message is enough to reassure shareholders that the company is doing everything to get back on track. What does "manageable" mean in this context? And does Garcia's message really address his customer base and how their issues will be resolved going forward?

1.5 million may represent only a fraction of Global's card numbers, and perhaps seems 'manageable' to Garcia. But Scott Patterson, public relations head for the Association of Certified Fraud Examiners, a global anti-fraud organization, has a different perspective.

"To us, it's still a huge number - and when I read it, I worry: Am I one of the 1.5 million?" Patterson further adds that Garcia's message was more an acknowledgment that a breach happened. "There was no clear admission of failure, and there were no reassurances to people on what does this all mean," he says.

A breach response message needs to provide as much information as possible for customers whose records were breached, so they are in a position to take action to protect their credit information. "The company would want to assure members of the public who are doing business with the company that their personal records will be safe going forward," says Lucy Thomson, a privacy advocate at CSC, a global IT information company, as well as chair-elect of the American Bar Association's Section of Science & Technology Law.

So, what should be an executive's appropriate response amidst a breach?

"There is no ideal and one right answer," says Mark Lobel, senior partner with PricewaterhouseCoopers. It largely depends on what the goals are of a company during a firefighting mode. "Is it to reduce the stakeholders' concern, address the public to minimize damage, or both?"

At minimum, an executive's response during a breach situation should be:

  • Comprehensive: The message should isolate a certain level of detail on the cause of the incident, what specific mechanisms there are in place to address the breach fallout and "some kind of admission of the problems faced," says Greg Thompson, VP at Scotia Bank, and a member of (ISC)2 Board of Directors. "I think it boils down to honesty and a sincere commitment to address the issues."
  • Frequent: Obviously a company will want to minimize negative publicity about the breach, but this should not be done at the expense of providing enough updates to assist the customers whose data has been breached. "The key is to protect the public's confidence in the company in the face of a breach by providing customers with periodic updates as further information about the breach becomes available," Thomson says.
  • Forthright: There should be an admission in the message of problems faced and some sort of regret, Patterson says. His advice to companies is to not overplay the "stay positive angle," but instead communicate a little bit of contrition: "We are truly sorry to those customers who have been affected, and we are working hard to secure their data and rectify the situation."

Of course, constant vigilance is central to preventing security breaches, and in a perfect world such incidents would never happen. But given we live in reality, it's time for leaders to be prepared with effective responses to the worst of situations.



About the Author

Upasana Gupta

Upasana Gupta

Contributing Editor, CareersInfoSecurity

Upasana Gupta oversees CareersInfoSecurity and shepherds career and leadership coverage for all Information Security Media Group's media properties. She regularly writes on career topics and speaks to senior executives on a wide-range of subjects, including security leadership, privacy, risk management, application security and fraud. She also helps produce podcasts and is instrumental in the global expansion of ISMG websites by recruiting international information security and risk experts to contribute content, including blogs. Upasana previously served as a resource manager focusing on hiring, recruiting and human resources at Icons Inc., an IT security advisory firm affiliated with ISMG. She holds an MBA in human resources from Maharishi University of Management, Fairfield, Iowa.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.