No items found.
Back
Link Copied!
Copy link
April 1, 2026
! 0
my reading

A cyber incident can happen at any time. It could be ransomware encrypting your files in the middle of the night, a data breach that's been going on for weeks without anyone noticing, or a phishing attack that gave an attacker access to an admin account. What determines how bad it gets is rarely the nature of the attack, it's how quickly and methodically you respond.

That's what incident management is about.

What is incident management?

Incident management is the structured process for identifying, containing, investigating, and recovering from a security incident. It covers the technical work, external communications, and the legal aftermath.  

Many people confuse incident management with crisis management. Crisis management is broader and covers everything from natural disasters to PR crises. Incident management is specifically focused on IT security incidents and follows a well-defined process with clear roles and phases.  

A common misconception is that having an incident management plan on paper is enough. A plan that's never been tested is effectively useless during an active attack. Stress, time pressure, and unclear roles mean that untested documentation rarely gets followed. The plan has to be practiced, and the roles have to be second nature.

The six phases of incident management

Established incident management frameworks divide the process into six phases. They look like a linear sequence, but in practice several of them overlap, especially during an active incident.

Phase 1: Preparation

Everything starts before the incident happens. The preparation phase is about building the capacity to actually handle an incident. That includes defining roles and responsibilities, developing an incident management plan, establishing communication channels, and setting up the technical tools needed for logging and detection. Organizations that invest properly in preparation handle incidents faster, limit damage more effectively, and recover with fewer complications.

Phase 2: Identification

Something seems off. Maybe a system is unusually slow, a user has logged in from an unexpected country, or an alert has triggered in your SIEM. The identification phase is about determining whether you're actually dealing with an incident, and if so, what happened, which systems are affected, and how serious it is. Inaccurate or delayed identification is one of the most common mistakes during incidents, and every hour of delay gives the attacker more room to operate.

Phase 3: Containment

The goal is to stop the spread. That might mean isolating affected systems from the network, blocking specific IP addresses, disabling user accounts, or segmenting parts of the infrastructure. It's important to distinguish between short-term containment, quickly limiting the damage, and long-term containment, which means more sustainable measures while the investigation continues. Shutting down systems too early, before evidence has been secured, is a common mistake that can complicate the forensic investigation.

Phase 4: Eradication

Once the spread is contained, the work of actually removing the threat begins. That can mean removing malware, closing backdoors, revoking compromised credentials, and patching the vulnerabilities the attacker exploited. The eradication phase often requires deep technical expertise and forensic analysis to make sure the attacker is no longer in the environment, hiding in a system you haven't looked at yet.

Phase 5: Recovery

The systems are clean. Now it's about gradually bringing them back online and verifying that they're functioning correctly, with no remaining threats. Recovery usually happens in stages, the most critical systems are prioritized and each one is closely monitored before the next is brought up. It's not uncommon for the recovery phase to take weeks or months, especially after ransomware attacks where the backup strategy wasn't solid enough.

Phase 6: Lessons Learned

The incident is handled, but the work isn't done. Two to four weeks after the incident is closed, a structured review takes place, a lessons learned session where the entire sequence of events is walked through. What worked? What didn't? What should we have caught earlier? The findings are used to update the incident management plan, improve detection capabilities, and make sure the same incident can't happen again.

Roles and responsibilities during an incident

An incident is the wrong time to discuss who does what. Those roles need to be defined and practiced in advance.

The incident commander leads the response and makes decisions under pressure. This isn't necessarily the most technically skilled person, it's the person who can hold the big picture together, communicate up to leadership, and keep the work moving forward even when the situation is unclear.

The technical lead is responsible for the forensic investigation and technical actions: isolating systems, analyzing logs, and removing the threat. In a complex incident, multiple specialists may be needed with responsibility for different parts of the infrastructure.

The communications lead handles all external communication, to customers, vendors, and if necessary the media, as well as internal communication to employees. It's a role that requires good judgment and is often underestimated during active incidents.

Legal and compliance need to be involved early, especially if personal data may have been stolen. Reporting deadlines are tight, and the legal aftermath can be costly if it's mishandled from the start.

Leadership needs regular updates and is ultimately responsible for business-critical decisions, such as whether operations should be temporarily shut down or whether to proactively communicate to customers.

Communication during an incident

Communication during an active incident is hard. There's a natural pull toward saying as little as possible to avoid alarm, but under-communication often causes more damage than transparency.

Internally, employees need to know what's happening, what they're expected to do, and what they shouldn't do. A common instruction is to not discuss the incident externally until the communications lead has approved it, to prevent inaccurate information from spreading.

Externally, you need to determine whether customers or vendors are affected and when they should be informed. Late communication that feels like a cover-up is often more damaging to trust than early communication that acknowledges what happened.

Regulatory reporting is not optional. For personal data breaches, you're required to notify IMY within 72 hours under GDPR. For incidents in organizations covered by NIS2, a preliminary report to the relevant supervisory authority is required within 24 hours, and a more complete report within 72 hours. CERT-SE is the national point of contact and can provide operational support during serious incidents.

Common mistakes during incidents

Many of the mistakes made during incidents are predictable. That means they can be prevented.

  • Shutting down systems too early. It might seem logical to immediately shut down a compromised system, but it can destroy critical evidence and complicate the forensic investigation. Isolation is almost always better than a full shutdown.
  • Communicating too late. Waiting to inform customers or regulators until you have "the full picture" often means missing deadlines and damaging trust more than necessary.
  • Not having a tested backup strategy. It's not uncommon for organizations hit by ransomware to discover that their backups are either encrypted along with everything else, or were never tested for recovery.
  • Not documenting in real time. During an active incident, it's easy to focus on the technical work and forget to keep a log. That makes both lessons learned and any legal proceedings significantly harder.
  • Underestimating lateral movement. An attacker who's gotten into one system has often moved further into the network. Focusing only on the first compromised system can leave the threat sitting elsewhere in your environment.
  • Resolving the incident without understanding the root cause. Cleaning up and restoring without identifying how the attacker got in means the door is still open.

When should you bring in outside help?

Not every incident requires external support, but in some situations getting the right expertise in quickly is critical.

Bring in outside help if the attack is still ongoing and you don't have the capacity to stop it, if your internal expertise isn't sufficient for a forensic investigation, if compliance requirements mean the investigation needs to be documented by an independent party, or if the scope of the incident is unknown.

Cyloq can be brought in on an emergency basis, even if you're not an existing customer. The first call is always free to assess the situation, and the contract and scope are defined in parallel with starting the response, so that nothing is delayed. The earlier you call, the more options you have.

Contact us

Book a meeting

Need emergency help or want to build your incident readiness? Contact us.

Whether you're in the middle of an incident or want to build a solid management capability before something happens, reach out. We'll figure out the situation together.

Book a meeting

FAQ

Frequently asked questions about incident management

What does incident management cost?

Emergency incident response is billed hourly, with additional charges for evenings and weekends. The hourly rate typically ranges between SEK 1,800 and 3,000. Framework agreements with guaranteed response times offer predictable costs and faster deployment when an incident occurs.

How quickly can you be on site?

For framework agreement customers, Cyloq guarantees a response initiated within 4 hours during business hours. Without an agreement, the response time is 24 to 48 hours, depending on workload. Initial triage and consultation can begin within one hour for urgent situations.

Do we need to call the police for a break-in?

It is not a legal requirement, but often recommended, especially if extortion attempts are ongoing or if personal data has been stolen. The Swedish Police Authority's NOA receives reports of cybercrime. In the event of a personal data breach, reporting to IMY within 72 hours is mandatory under GDPR.

How long does typical incident management take?

The acute phase typically lasts a few days to a couple of weeks. Containment and eradication are often completed within the first week. Recovery and full normalization can take months, especially with ransomware. “Lessons learned” are conducted 2 to 4 weeks after the incident concludes.

Can you help us if we're not already a customer?

Yes. We accept new clients, even in urgent situations. The initial consultation is always free to assess the situation, and contracts and scope are defined in parallel with the immediate start of the work to avoid delaying our response.