

Resources for cyber incident management
Simple and actionable tools to help your organization maintain clarity when a cyber incident occurs.
Quick Reference Guide | First Steps to Take in Case of a Cyber Incident

When a cyber incident occurs, the difficulty is not only technical. It's about knowing what to do, in what order, and with whom, without making the situation worse.
This quick reference guide helps you frame initial decisions, avoid common mistakes, and protect critical data from the outset. It's based on real-life cyber crisis management scenarios.
Executives and Mgmt
To make the right strategic decisions in a crisis situation
IT managers, CIOs, CISOs
To structure technical action and coordination
SMEs and mid-sized Co
Without a dedicated cybersecurity unit or advanced technical expertise
What the quick reference guide contains
A short, clear, and immediately usable document for navigating the critical first hours of a cyber incident with confidence. Printable format, designed for usability even under pressure.
1
Immediate containment actions
Quickly identify and isolate affected systems to limit the spread
2
Critical points of attention
Absolute prohibitions and common mistakes to avoid under stress
3
Securing backups
Preserve your data and evidence before any restoration
4
Crisis communication
Coordinate outside of potentially compromised systems
5
Observation and qualification
Document the incident to facilitate analysis and response
6
Prioritizing decisions
A framework for maintaining a calm and structured approach
Common mistakes avoided
In stressful situations, certain decisions can complicate management: restarting a compromised machine, launching uncontrolled actions, restoring backups too soon, or communicating via potentially impacted tools.
Download and next steps
An initial discussion to outline your preparation

A short exchange often allows you to quickly identify grey areas, priority risks and realistic actions adapted to your structure.
This sheet is a starting point
Elle ne remplace pas un dispositif de préparation complet et ne permet pas d'évaluer la solidité réelle de vos sauvegardes, de clarifier les rôles en cellule de crise, ou d'identifier vos dépendances critiques.