Creating an Incident Response Plan
by Commonwealth Financial Network
Advisors often ask meĀ what more they can be doing security-wiseānot just to keep compliant with regulations but also to make sureĀ they arenāt putting both their officesā and clientsā information at risk. After all, most of our advisors have great technical controls due to the Commonwealth Shield, and many blend in some security awareness training for a more comprehensive approach. The gaps appear to be covered.
But even if you have all of the right elements in place, you still arenāt answering one crucial question: What if your controls fail?Ā The earlier you plan for such mishaps, the less impactful they will be when they happen to you. So if you donāt have one already, the time toĀ start creating an incident response plan (IRP) is now.
An IRP can help protect your firm's information in the event of a security incident, defined asĀ any event that negatively affects a critical information assetās:Ā
- Confidentiality (e.g., disclosure to unauthorized users)
- Integrity (e.g., unauthorized modification)
- Availability (e.g., destruction, outage)
For your IRP, itās best to create three to five specific scenarios that are most likely to affect your firm and use those as your model when thinking of an āincident.ā Common scenarios include:Ā
- Malicious software (malware) infection
- Unauthorized disclosure of sensitive information, such as personally identifiable information or protected health information
- Denial-of-service attack
- Physical theft (of hard drives, laptops, paper documents, etc.)
- Fraudulent wire transfer

Once you've thought about the scenarios, you're ready to take the next steps forĀ developing anĀ IRP:Ā
1) Determine theĀ purpose and scope. An IRP should begin with a brief purpose statement (1ā2 sentences) that explains what it should do and why your firm needs it. Everything in your IRP should exist for this purposeābut keep in mind that you canāt predict every scenario, so you need to build in a level of flexibility.
TheĀ scope immediately follows theĀ purpose statement and defines exactly what the IRP covers. Here, include three to five common security incidents. Be sure to explain where you draw the line between an incident and a disaster (e.g., floods, hurricanes, prolonged power outages, riots), which shouldĀ be addressed by a separate disaster recovery plan.Ā
2) Define roles and responsibilities. When an incident occurs, you donāt want everyone on your staffĀ waiting around for someone else to do something, so this step is critical. Each person should have a clearly defined role as part of your incident response team (IRT).
In a relatively small organization, it's likely thatĀ you, your staff members, and your broker/dealer will wear multiple hats. Essential roles include:Ā
- Incident lead.Ā The incident lead is the person who declares an incident and holds the ultimate responsibility when an incident occurs.
- Legal counsel.Ā Youāll need to know whether an incident falls under your stateās breach notification laws. Here at Commonwealth, for example, we'll act as legal counsel for our advisors and review statutes to determine whether client communications are necessary.
- Communications specialist.Ā If an incident does require breach notification, youāll need a skilled communicatorātypically one of your staff membersāto reach out to your clients.
- External technical team.Ā Incidents often require technical expertise that your firm may not possess. Be sure to research external tech companies to create a list of potential resources. For securely wiping a hard drive, you could use a big chain like Best Buy; for digital forensic analysis, however, youāll need a more specialized team on hand.
3) Categorize incident severity ratings. TheĀ severity of incidents can be wide-ranging. You wouldnāt want to treat a personally identifiable information breach the same way that youād treat an office-wide incident of ransomware.
Best practice is to list three severity ratings (1ā3 or AāC), and define the criteria for each. Here, financial impact and potential damage should be top of mind. The chart below provides a sample severity rating table.

4) CreateĀ a response workflow. A response workflowĀ will outlineĀ next steps for dealing with an incident, plus keep you and your staff from panicking and perhaps making a bad decision in the heat of the moment. ThisĀ high-level list of steps (no more than eight) should be general enough to apply to all of the scenarios you defined in the scope section of your IRP.Ā
Hereās an example of an incident response workflow:Ā
- Preparation:Ā Create an IRP to meet your firmās specific needs in the event of an incident.
- Detection: Confirm that an event is actually a security incident.
- Reporting: Inform management, responders, and your broker/dealer.
- Mitigation: Contain the incident to limit its impact (e.g., disconnecting an infected computer from the network).
- Recovery: Bring the affected system back to an operational state.
- Remediation: Identify the root cause of the incident, and take the proper steps to prevent it from occurring again.
- Lessons learned: Evaluate the incident response workflow and how it could be improved.
5) ReviewĀ your IRP.Ā Your IRP should be reviewed at least annually, as well as when any significant changes occur that may affect your incident response workflow (e.g., office relocation, office-wide hardware upgrade).Ā In addition, periodically testing your IRP is critical. You donāt want to discover issues with your plan when itās time to use it! We recommend conducting an annual tabletop exercise with your internal IRT.
This exercise is an opportunity to walk through a crisis event in a non-crisis environment. Choose one of your three to five scenarios and talk through how your firm would handle it, step by step. Update your IRP as you discover new things.
Once your IRP is complete, it should be classified as highly confidential and stored in a secure place. Only those employees who are actively involved in your IRT should be allowed access. For example, the staff member who will write your communications should have access, but your new intern who has no intentions of being involved shouldnāt have permission to read the document.
Also, you should not share the document with your clients. An IRP holds valuable information about how your firm handles security; in the event that it falls into the wrong hands, an attacker would have valuable information on how you would respond to a hit.
If your client does ask what would happen if your office were to suffer a data breach?Ā An appropriate response would be, āWe have a response plan in place in the event of a cyber-related incident. We rely on our broker/dealer, as well as other third parties, for additional help. And we review and test our plan at least annually.ā
Security isnāt justĀ about the controls that protect your information; itās also about having a plan in case all goes wrong. An IRP is a big piece of the puzzle that many forget to consider, but keeping a well-documented plan can save you a lot of potential damage when an incident does occur.
Do you have an IRP in place? How often do you test it? Please share your thoughts with us below!
Ā Commonwealth Financial Network is the nationās largest privately held independent broker/dealer-RIA. This post originally appeared on Commonwealth Independent Advisor, the firmās corporate blog.
Copyright Ā© Commonwealth Financial Network
