By: Andy Valentine
As the business world goes increasingly digital, cybercriminals have homed in on the most effective way to extort companies: ransomware.
I see the work of most digital forensic teams now focused on this type of devastating attack, and that focus is only increasing. Ransomware attacks jumped by 73% between 2022 and 20231. I remember grappling with a more diverse array of corporate-directed cybercrime a decade ago.
The rise of ransomware indicates that cybercriminals have found a powerful, efficient way of hamstringing corporate operations, which means that digital forensics teams need to be powerful and efficient in response. Siloed, disjointed incident response and incident recovery processes won’t cut it in this environment. Yet, it’s still too common for these teams to lack a shared set of understandings, approaches, and goals to coordinate their efforts.
Let’s look at how incident response and incident recovery teams can work together and ensure that all stakeholders play a role in the incident lifecycle.
Incident response vs. incident recovery
During and after a catastrophic infrastructure incident, two essential processes must occur: an investigation into what exactly occurred and how it happened, and the recovery of the compromised digital environment, sometimes by rebuilding it from the ground up.
The former—incident response—looks to determine the particulars of the problem, such as how bad actors infiltrated the digital environment, how they moved through it, and what they stole. The latter—incident recovery—is about bringing organizations back to working order as quickly as possible after an incursion has knocked them out.
The divergence of these two workstreams often complicates the process of bringing an organization back to strength after an incident. These two teams typically operate in silos and are directed by differing governance layers—but the separation can cause functional problems as the teams may accidentally work at cross-purposes.