Skip to Content

CIM - Preparation: Communication

March 3, 2026 by
CIM - Preparation: Communication
Resilix, Hendrik Noben

Imagine a flight crew facing severe turbulence. If the captain, co-pilot, and cabin crew don't communicate clearly, confusion spreads instantly. Passengers panic. Decisions get delayed. Small issues escalate. Cyber incidents are no different.


In this phase of our Incident Management Roadmap, we focus on Preparation: Communication, ensuring that when pressure rises, information flows clearly, securely, and to the right people at the right time. Communication during an incident isn't improvisation. It's structure. It's predefined channels. It's knowing who speaks, who decides, and who gets informed. Without it, even a well-handled technical response can turn into reputational damage.

Internal Communication

Your coordinated response engine

When an incident hits, multiple teams activate simultaneously. IT is investigating. Management needs status updates. Legal wants to understand exposure. Operations is assessing business impact.

Without a plan, each team creates its own narrative. And competing narratives during a crisis are poison. This is why a Communication Plan isn't optional. It's foundational. Think of it as the blueprint everyone works from before the building catches fire. It defines who must be informed at each severity level, how escalation flows from analyst to management to executive, which channels are used (and which backups exist if primary channels are compromised), the rhythm of status updates so people stop interrupting the responders, and what gets documented, by whom, and where.

The Incident Response Manager owns the flow. Not the technical response, but the information response. They're the one making sure the forensics team isn't duplicating what the network team already found. They're ensuring the CISO gets a structured update instead of fragmented Slack messages from six different people. One coordinated voice internally prevents the chaos that comes from everyone broadcasting on their own frequency.

Now here's something many organizations overlook: channel security. During an active breach, the attacker may be reading your emails, or may have access to your Teams environment. Discussing your containment strategy on a compromised platform is like planning your next chess move while your opponent reads your notes.

Encrypted out-of-band channels, set up before you need them, are not a luxury. They're a necessity. Whether it's WhatsApp or Signal groups, dedicated secure collaboration platforms, or even pre-arranged phone trees: the time to configure and test these is now, not during the incident.

Finally, predefined update templates eliminate hesitation when speed matters most. A structured situation report covering what happened, what the current impact is, what actions have been taken, and what comes next can be issued in minutes rather than drafted from scratch while the clock is ticking. Templates don't make communication robotic. They make it fast and consistent when your team's cognitive bandwidth is already maxed out.


External Communication

Protecting trust under pressure

Internal chaos stays internal, at least for a while. But external communication missteps are immediately visible and remarkably hard to undo.

When a cyber incident reaches the outside world, whether through a service disruption customers notice, a data breach that triggers regulatory obligations, or simply a journalist asking questions, the organization's credibility is tested in real time.

And the instinct most organizations follow? Silence. Wait until we know everything. Don't say anything that could be used against us. That instinct is almost always wrong.

Silence doesn't protect you. It creates a vacuum. And vacuums get filled by speculation, by social media, by your competitors' PR teams. A Notification Strategy prepared in advance lets you act instead of react. It defines when external parties must be informed (regulatory timelines like NIS2 and GDPR don't wait for your comfort level), who approves external statements before they go out, which regulatory bodies and authorities need formal notification, and how legal, compliance, and communications collaborate on messaging.

A Designated Spokesperson is non-negotiable. One voice. One message. Every time. When multiple people speak externally (the CEO on LinkedIn, the CTO in a press interview, customer service via email) and their messages don't align perfectly, you haven't communicated. You've created confusion. And confused stakeholders lose trust fast.

Pre-drafted external templates for different scenarios (ransomware, data breach, service outage, third-party compromise) aren't about having canned responses. They're about having a starting point that's already been reviewed by legal, approved by leadership, and aligned with regulatory requirements. When the incident hits at 2 AM on a Sunday, you don't want your first draft to also be your first legal review.

The real power here lies in cross-functional preparation. IT understands what happened technically. Legal understands what must be disclosed. PR understands how to frame it without creating panic. Customer service understands what frontline questions will come. None of these teams can handle external communication alone. But prepared together, with roles, templates, and escalation paths already agreed upon, they operate as one unit instead of four departments stumbling over each other.


Speed, Accuracy, and Consistency

The Balancing Act

Every incident communication walks a tightrope between three forces that constantly pull against each other.

Speed, because silence breeds speculation, and delayed communication erodes trust. Stakeholders don't expect you to have all the answers immediately, but they expect to know you're aware, you're acting, and you'll keep them informed.

Accuracy, because premature statements get corrected, and corrections get remembered. Saying "no customer data was affected" on day one, only to discover the opposite on day three, is worse than saying "we're still assessing the full impact" from the start.

Consistency, because internal and external messages must tell the same story. If your CISO tells the board one thing while your spokesperson tells the press another, the resulting contradiction becomes the story itself.

Balancing these three isn't intuition. It's practice. Tabletop exercises should specifically test communication under pressure, not just technical playbooks. Can your spokesperson deliver a holding statement within 30 minutes? Can your legal team review a draft notification in an hour? Does your escalation chain actually work at midnight? If you've never tested it, you don't have a communication plan. You have a document.


Wrapping Up

Technology contains the threat. Governance defines the structure.

But communication determines whether the incident feels controlled or chaotic to your team, your leadership, your customers, and your regulators.

The organizations that handle incidents well aren't necessarily the ones with the most advanced security tools. They're the ones where everyone knows who to call, what to say, and when to say it, because they prepared for exactly that moment.

In the Incident Management Roadmap, communication preparation means building the muscle memory that turns crisis into coordinated response. Clear internal flows. Secure channels. Pre-approved external messaging. A single, credible voice. And the discipline to test all of it before you need it.


Five Questions Every C-Level Executive Should Ask

1. If our primary communication channels were compromised tomorrow, does every team member know exactly where to go and who to contact? 

Have we established and tested out-of-band secure communication channels? Would our response team be able to coordinate effectively if email and Teams were both unavailable?

2. How quickly can we issue a structured external statement after discovering a significant incident? 

Do we have pre-approved templates and a designated spokesperson ready? Have we actually timed this process in a simulation, or are we guessing?

3. Are our regulatory notification obligations mapped, assigned, and rehearsed for each incident type? 

Under NIS2 and GDPR, timelines are strict and non-negotiable. Do our legal and compliance teams know exactly what triggers a notification, and can they execute it under pressure?

4. When was the last time we ran a communication-focused tabletop exercise, not just a technical one? 

Technical incident response gets tested regularly. But have we stress-tested our ability to coordinate messaging across IT, legal, PR, and customer service simultaneously during a simulated crisis?

5. If a journalist called our reception right now about a data breach, what would happen? 

→ Is there a clear protocol for incoming press inquiries during an incident? Would the person answering the phone know who to redirect to, and more importantly, what not to say?

If these questions surface gaps, that's not a problem. That's preparation working exactly as it should. The gaps you find now are the ones that won't hurt you later.

Let's Connect

Are you in need of assistance from our Incident Management Experts, or want to discuss how these communication principles apply to your organization? Don't hesitate to fill out the contact form below!