Business Development
 

Cybersecurity: Putting a Plan Into Action After a Breach

Reduce damages from a cyberattack by initiating a quick response and recovery plan.
By Dustin Bolander
November 2025
 

Incident response plans (IRPs) often sit inside your document management system or in a binder, quietly gathering dust until the day they’re urgently needed. When a breach hits your firm, the window to respond is narrow, and the situation can escalate quickly. Real world data from cyber insurance shows the faster and more organized the response is by a firm, the lower the damages and downtime. 

The minute a breach is identified, the firm must execute the IRP. Multiple factors make a breach response more difficult for a law firm: strong personalities, a constant sense of urgency and a culture to never stop working. An IRP helps the firm better navigate this by predefining certain things such as authority figures during the breach. 

Multiple factors make a breach response more difficult for a law firm: strong personalities, a constant sense of urgency and a culture to never stop working. 

Follow the Leader: Cyber Insurance 

If the firm has a cyber insurance policy, this must be integrated with the IRP and involved early. Even if the firm is unsure of a breach and is investigating, a “notice of circumstance” should be sent to the insurance carrier, letting them know a claim may be coming. This does not affect your rate but is part of the policy requirements for claims notifications. If a true breach is identified, the firm’s insurance carrier will have specific processes and experts to help and will assign experts to lead the response effort.  

Clear Communication with Guardrails 

Discussing an active breach can lead to liabilities for a firm, both internal and external. In cyber insurance, there are horror stories of attorneys talking to the media and making a bad situation worse, or of IT becoming impatient and restoring from backups, only to find the hackers were already in the system. One of the first steps in every IRP should be a managing partner or equivalent reiterating to the firm that the processes must be followed and respected. But what happens after the firm has recovered? “Everyone returns to work” is the wrong answer — this is the prime time to work on improving processes and cyber security.

One common recommendation for IRPs is to convene a breach response team/committee. This group should not disband post-breach; their work is far from complete. Within a few weeks of the firm returning to 100% functionality, the committee should have another meeting to review the successes and failures during the incident. This includes pre-breach prevention, actions taken by both the firm and outside parties during the breach, and then how the firm caught up on any work or other tasks delayed by the breach. Focus solely on what went wrong and right, but do not yet spend time on how to fix it. 

At this point, it may be a good idea to create a new committee. The current breach response committee has been working very hard and is likely both tired and very behind on their day-to-day work. The new improvements committee can approach this with a set of fresh eyes, and the added benefit of being slightly more outside of the core IRP.

Also in This Issue

Back to Top