When a security compromise occurs, the RIM team must know exactly what records were exposed to help notify regulators within statutory deadlines.
Integrating your records inventory with the IT incident response playbook ensures the organization can accurately report the severity of the breach.
- Do you know your specific role in the event of a catastrophic data breach?
- Are your data maps detailed enough to tell IT exactly what sensitive information lives on a compromised server?
Action Item: Review your organization's cyber incident response plan and insert a mandatory step for RIM consultation.