The Breach
A data breach at a publicly traded financial firm spirals from bad to catastrophic as the press, regulators, and lawyers close in.
Setting: You are the executive leadership team of a mid-sized financial services company (400 employees, publicly traded). It is Tuesday morning.
Read aloud: Your CISO bursts into the boardroom: overnight monitoring detected unusual data exfiltration. Preliminary analysis suggests customer financial records — potentially 200,000 accounts — may have been compromised. The attack vector appears to be a phishing email opened by a senior accountant three days ago. The press does not know yet. Your share price opened steady this morning.
Timed Injects
A journalist from a national newspaper calls your comms team. They have a source claiming your customer data is being sold on a dark web forum. They want a comment within the hour.
Your IT team discovers the breach is worse than expected — the attacker has had access for 2 weeks, not 3 days. Internal emails between board members discussing a recent acquisition are also compromised. Your regulator's hotline has left a voicemail asking for an urgent callback.
A class-action law firm has already contacted three of your major institutional clients. Your share price is down 8% since the news leaked. An employee posts on social media criticising the company's cybersecurity practices.
- How did you prioritise competing pressures?
- When did you decide to go public?
- What would you do differently in the first hour?
- How did internal communication affect your response?