No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

How to Reassure Stakeholders When Facts Are Still Unknown During Cyber Incidents

Scenario planning and coordination between legal and communications experts allows organizations to build adaptable messaging

by Jena Valdetero, Wouter van Wengen, Jonah Pitkowsky, Lily Williams and Jamie Singer
December 22, 2025
in Cybersecurity
hacker penetrating system

Cybersecurity incidents pose a fundamental challenge: How do you reassure stakeholders while acknowledging that many facts remain unknown early in forensic investigations? Jena Valdetero and Wouter van Wengen of Greenberg Traurig and Jonah Pitkowsky, Lily Williams and Jamie Singer of FTI Consulting examine how threat actors increasingly employ triple extortion tactics, from encrypting and exfiltrating data to DDoS attacks and swatting that brings cyber threats to executives’ literal front doors, requiring careful coordination between legal counsel and communications professionals to build messaging that adapts to evolving scenarios. 

In an ideal world, everything goes according to plan. You snag the tickets to the sold-out show, it stops raining before you leave for work, and your train is running right on time. We love those moments because nobody likes a curveball. But things don’t always go according to plan, and in those moments where a reaction is needed, what we say matters. 

When responding to a cyber incident, the stakes associated with providing the right information at the right time are high, especially when threat actors escalate situations and facts change quickly. The ability to deploy the right strategy, whether rapid stakeholder communication, legal guidance or technical containment, can determine whether an organization preserves or loses trust. 

Cybersecurity incidents pose a fundamental challenge: How do you reassure stakeholders and retain their confidence throughout an incident while acknowledging that, especially early on in a forensic investigation, many facts are still unknown? It takes time to investigate the full scope of an incident and to validate the activities of threat actors. Coupled with increasingly aggressive threat actor tactics, particularly in a cyber extortion event, these realities make sharing information about an incident perilous since facts can often change.

In a world where cyberattacks are increasing in frequency, stakeholders from customers to employees to regulators scrutinize how well a victim organization handles its response. Navigating this challenge requires a holistic approach informed by the latest threat intelligence and careful coordination among the victim organization, external legal counsel and cyber communications professionals.

drawing on map
Cybersecurity

Rather Than Rebellion, Treat Shadow IT As Your Tech Roadmap

by Apu Pavithran
August 5, 2025

Begin by understanding the what and why of shadow IT

Read moreDetails

Communicating through double and triple extortion incidents

Nearly all ransomware incidents these days involve varying levels of extortion. Not only do threat actors often encrypt systems or data to render them inaccessible to the victim organization, but threat actors frequently also steal large quantities of data and threaten to post the data online unless a ransom is paid. Threat actors sometimes employ additional pressure tactics, like harassment of employees or continued attacks on the victim’s systems, to coerce a victim into paying a ransom.

The first step to communicating with confidence through a double or triple extortion incident is to learn the facts and plan for potential escalations. If the threat actor is known, a victim organization can prepare for potential escalations with knowledge of that actor’s techniques and patterns of behavior. For example, the Akira ransomware group was, for a number of years, a pure extortion operation: It exfiltrated and held data ransom but did not encrypt systems in the process. In 2024, experts learned the group had again begun to encrypt systems, causing additional complications for response and recovery.

When sensitive data is involved, a victim organization may have obligations under data privacy and security laws to notify affected individuals and/or regulators and may have contractual obligations to notify other third parties of an incident affecting their data. Careful communications are key to ensuring stakeholders receive the right information at the right time.

During a triple extortion event, where data is encrypted, exfiltrated and the threat actor places additional pressure on the victim organization, whether through a distributed denial-of-service (DDoS) attack or aggressive outreach to stakeholders, communications teams must be prepared for multiple waves of messaging that recognize the evolving nature of threats. A company cannot anticipate every possible escalation tactic, but they can mitigate risk by building messaging that is adaptable to a variety of scenarios.

Through thoughtful scenario planning and close coordination between legal and communications experts, organizations can prepare for these extortion curveballs in line with contractual, regulatory and litigation considerations, all while preserving attorney-client privilege over the drafting of communications.

Swatting and other stressors

Some threat actor curveballs intend to hit closer to home and require an especially careful approach. One such escalation is “swatting,” an aggressive tactic where the threat actor makes a hoax call to law enforcement claiming an emergency is underway to draw a large response to the home of a victim organization’s executives or to the business itself. Even the threat of swatting can cause major public concern, such as a recent example of a cybercriminal threatening to use swatting against patients at a hospital that had not paid a ransom.

Bringing a cyber incident to a victim’s literal front door blurs the lines between cyber threats and physical security and weaponizes fear to encourage payment. The first instance of swatting is typically a surprise and can make a victim organization look unprepared. Organizations facing swatting risk must be prepared to communicate quickly to avoid missteps and prioritize the safety of internal stakeholders.

This messaging should be drafted in close coordination with legal, law enforcement and threat intel experts, to provide instructions on how potentially at-risk individuals can protect themselves. Though swatting attempts can be unpredictable and personally challenging, assuring stakeholders the issue is being handled can go a long way to retaining trust when it matters most.

Ransomware hoaxes and threat actor lies

Challenging questions arise when the situation changes unexpectedly, such as how do you reassure key stakeholders when ransom notes are sent to employees … even though there’s no evidence an attack ever occurred?

In recent months, impersonators of threat actor group BianLian circulated ransom notes to business executives, demanding payment in bitcoin. This run-of-the-mill ransomware escalation tactic has one key difference: In this case, there was no evidence an attack had even happened. Executives were faced with a challenge: While it may be tempting to deny the legitimacy of the notes, making definitive statements you may need to walk back later erodes trust far more than taking time to gather the facts. So how should an organization respond?

What not to do: refute the claims in public right away. Making definitive statements opens up an organization to potential reputation risk and legal liability if new evidence emerges and there is legitimate threat actor activity. In this situation, the company should reassure stakeholders the organization is investigating claims and responding to the situation as they gather the facts.


Tags: Corporate CommunicationCyber RiskCybercrime
Previous Post

Why Customer Experience Optimization Requires Cross-Functional Accountability

Next Post

2 Paths, 2 Outcomes: DOJ’s Inconsistent Corporate Self-Disclosure Policies

Jena Valdetero, Wouter van Wengen, Jonah Pitkowsky, Lily Williams and Jamie Singer

Jena Valdetero, Wouter van Wengen, Jonah Pitkowsky, Lily Williams and Jamie Singer

Jena M. Valdetero serves as co-chair of Greenberg Traurig’s US Data privacy and cybersecurity practice and is a trusted adviser to clients facing complex and high-stakes data privacy and security challenges. With a track record of leading thousands of data breach investigations over the past 15 years, she combines her broad litigation experience with a deep understanding of the evolving privacy landscape to protect her clients’ interests.
Wouter van Wengen is a member of the intellectual property and technology practice in Greenberg Traurig’s New York office. Admitted to practice in both New York and the Netherlands, he brings a transatlantic perspective to his work. His experience across multiple tech-related legal disciplines allows him to effectively navigate complex issues and address clients' EU and US needs.
Jonah Pitkowsky is a senior consultant at FTI Consulting in New York.
Lily Williams is a senior consultant in cybersecurity and data privacy communications at FTI Consulting in Chicago.
Jamie Singer is a senior managing director in the strategic communications segment at FTI Consulting in Chicago. Jamie co-leads the firm’s cybersecurity & data privacy communications practice and has counseled Fortune 500 companies and public sector organizations through some of the most high-profile and largest cybersecurity crises of the past decade.

Related Posts

medications spilling from bottle

The FDA’s Prescription for Balanced Messaging Applies Beyond Pharma

by Alan Minsk, Laura Dona and Grace Gluck
December 8, 2025

As regulators increasingly focus on consumer perception, whether a disclosure exists matters less than whether consumers understand it

news roundup bw

Boards Seeking AI Specialists

by Staff and Wire Reports
November 13, 2025

73% of CISOs report significant cyber incident in past year; AI implementation on par with economy on list of business...

news roundup bundled papers

Board Oversight of AI Triples Since ’24

by Staff and Wire Reports
October 31, 2025

UK firms express high concern over financial reforms; political risk climbs list of corporate threats

red square moscow on clear day

Russia’s Hybrid Warfare Triggers Logistics, Comms & Operational Disruption

by Richard Gardiner
October 14, 2025

US companies supporting Ukraine's war effort or operating in defense sectors face sharply elevated risk of sabotage designed to delay...

Next Post
divergent paths aerial view

2 Paths, 2 Outcomes: DOJ's Inconsistent Corporate Self-Disclosure Policies

reminder to speak up
No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • About
    • About CCI
    • Writing for CCI
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Downloads
    • Download Whitepapers & Reports
    • Download eBooks
  • Books
    • CCI Press
    • New: Bribery Beyond Borders: The Story of the Foreign Corrupt Practices Act by Severin Wirz
    • CCI Press & Compliance Bookshelf
    • The Seven Elements Book Club
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights