No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Cybersecurity

In Crisis or In Control? Evolving Threat Actor Tactics Illustrate the Need for Clear Cybersecurity Communications Strategies

Preparing for the unexpected goes beyond IT expertise

by FTI Consulting
April 30, 2024
in Cybersecurity
cybersecurity communications collage

Many companies understandably focus on technical matters when implementing cybersecurity technology, processes and procedures. But as the tactics of threat actors become increasingly aggressive, often personally targeting high-profile executives and their families, reputation risk is one of the clear knock-on effects for companies affected by an ongoing attempted attack. A group of authors from FTI Consulting dig into the cybersecurity threat landscape and share tips for developing an informed cybersecurity communications strategy.

Allie Bohan, Tess Sams, Jonah Pitkowsky and Ana Wilmer co-authored this article.

Picture this: you’re a senior executive whose organization is managing a crippling ransomware attack. For several days, your legal, IT, communications and executive teams have been working around the clock to restore encrypted systems and engage with stakeholders concerned about business continuity and the safety of data shared between organizations.

Acting at the direction of your board, you have chosen not to pay the threat actor’s ransom demand, opting instead to restore systems from backups — an often lengthy endeavor — and face the prospect of a data leak involving information exfiltrated from your corporate network.

The threat actor, unwilling to accept your decision, turns up the heat. They send a bouquet of flowers, accompanied by a chilling note resembling a condolence letter, to the home of your CEO. The note indicates, in no uncertain terms, that extortion tactics will continue to escalate if your company does not pay the ransom. Having thought the worst was behind you, you are unprepared for this escalation and do not have a communications strategy to respond if this development becomes public or the escalations continue. In this critical moment, you begin to lose control of the narrative — and possibly the entire situation. Making matters worse, your CEO’s family is now part of the equation.

Such a multifaceted threat, where a bad actor is instilling fear and coercion beyond the digital realm, complicates a cybersecurity incident response. This type of scenario has become more common as bad actors continue to innovate and utilize aggressive tactics to pursue ransom payment.

Organizations that are unprepared for such escalations and do not act rapidly to adapt their communications strategy may quickly become overwhelmed, responding to increasingly unpredictable behavior from online criminals and not appearing in control. Thorough scenario planning and staying abreast of the evolving cybersecurity threat landscape are essential to help organizations respond effectively and enhance their readiness for potential escalations.

As threat actor behavior continues to evolve, communications professionals must ensure that their cybersecurity communications incident response strategy is adaptable to support these types of unforeseen developments.

illustration representing sec cybersecurity rules
Cybersecurity

Everything You Need to Know About the SEC’s New Cybersecurity Rules

by David Lynn
September 6, 2023

Read moreDetails

The evolving cybersecurity threat landscape

Global cybercrime response costs are projected to reach nearly $11 trillion by 2025, and ransomware attacks in particular are on the rise across industries. At the same time, certain threat actor groups, such as BianLian and 8Base, are pivoting toward a pure data extortion business model, monetizing their attacks by exfiltrating data without employing encryption. Consequences of sensitive data leaks, including reputational damage and regulatory penalties, can exert significant pressure on victims to pay the ransom, even without the need to develop and deploy malware to a victim organization’s network.

In addition to the sheer volume of cybercrime, facilitated by the proliferation of ransomware-as-a-service (RaaS), factors reshaping the landscape include exploiting zero-day vulnerabilities en masse, supply chain attacks and capitalizing on cloud security vulnerabilities to infiltrate systems.

Alongside these factors, threat actors are employing increasingly aggressive communications tactics to pursue ransom payments, including forming strategic partnerships with cybersecurity industry reporters and pursuing legal avenues by filing complaints with the SEC as seen with AlphV (BlackCat).

Moreover, threat actors have resorted to threatening company executives, employees and their families in their homes, which can escalate to swatting concerns, a harassment technique that involves deceiving emergency services into dispatching a SWAT team to the target’s home. Additionally, they may contact employees after gaining access to employee directories or human resources files or inundate company executives with hundreds to thousands of messages within a short timeframe to pressure them into paying the ransom. In recent years, they have targeted companies and executives involved in M&A transactions with the intent to disrupt or sabotage deals.

These tactics underscore the need for organizations to be equipped to communicate as a first line of defense against evolving cybersecurity threats.

Developing a modern cybersecurity communications plan

Essential to comprehensive communications preparedness is regular refinement of the cyber crisis communications plan and ongoing training to ensure that members of the communications team are equipped with the latest knowledge and insights necessary to navigate the changing threat landscape.

While it is impossible to anticipate every scenario, establishing adaptable frameworks and practicing them with your team so that you can adapt and act quickly in a real-life crisis is crucial for timely narrative control and preserving stakeholder relationships when cybersecurity incidents arise. Scenario plans should contemplate a number of likely situations, informed by experts who see ransomware threat actors daily, and include a communications strategy and suggested messaging tailored to all key stakeholders.

Here are several factors to consider:

  • Response time: Activating quickly with a rapid-response plan in a high-pressure cybersecurity crisis and during any threat actor escalations is a critical capability for the cybersecurity response team to possess and continuously improve upon. Robust escalation procedures and activation protocols are key for the relevant teams to immediately start considering and executing a communications strategy.
  • Roles and responsibilities: Establishing a consistent understanding of team members’ roles and responsibilities, and their respective decision-making authority, during a cybersecurity crisis is necessary to reduce conflicting understandings and avoid costly, redundant activities. These should be driven by clear risk and severity assessments which mirror those in more technical documentation, in line with the organization’s priorities and business objectives.
  • Messaging and rollout: Formalizing messaging and communications review, approval and distribution structures ahead of time can minimize deliberation time in these scenarios and allow all appropriate individuals in the organization to weigh in to ensure the communications messaging and strategy are appropriately vetted. Additionally, strategy and messaging should be adaptable and deployable, meaning that they can be lifted off the page and leveraged quickly.
  • Risk assessment and horizon planning: Understanding your organization’s unique communications risks and tailoring your plans accordingly is a necessary activity to adapt to any escalations. Rigorous reviews of existing materials and procedures as well as in-depth interviews with relevant personnel help to understand both the formal and informal elements of an organization’s communications response plans.

Tags: Corporate CommunicationReputation Risk
Previous Post

CSRD Essentials: How New Requirements Are Set to Affect Your Business & Value Chain

Next Post

Throwing Bodies at AML Compliance Doesn’t Work, but Are You Asking the Right Questions About AI?

FTI Consulting

FTI Consulting

Related Posts

cfpb building sign

What Does Weakened CFPB Mean for FinServ Compliance?

by Carrie Pallardy
April 30, 2025

Federal deregulation doesn't mean compliance professionals can relax. CCI contributing writer Carrie Pallardy investigates the implications of a weakened Consumer...

redacted words

CCI Survey Seeks Input on ‘Woke’ Language

by Staff and Wire Reports
March 20, 2025

Has your organization adapted internal or external communications to remove DEI-related terms? We want to hear from you.

turbulent waters

Compliance in Transition: Navigating Political & Regulatory Turbulence

by Anna Romberg and Julia Haglind
February 14, 2025

Returning to core values — not chasing regulatory or political shifts — is the key to sustainable compliance

following the leader

A Behavioral Economics Approach to Privacy by Design

by Vivek Agarwal
November 12, 2024

Consumer trust is everything in our increasingly digital age

Next Post
hundred dollar bill floating in water

Throwing Bodies at AML Compliance Doesn't Work, but Are You Asking the Right Questions About AI?

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights