Global · Brussels Hub · Crisis Command · Major Incident Doctrine · Operational Resilience
2026: Crisis Command · Major Incident Doctrine · Decision Architecture

Control Fails Before Systems Do.

Doctrine for organisations operating under pressure, uncertainty, and systemic disruption.

Crisis does not create failure. It exposes structures that were already weak. These are not playbooks. They are decision systems for environments where information is incomplete and consequences are irreversible.

Signature Doctrine Systems

The Architecture of Crisis Coherence

Four proprietary frameworks. Control must be established before action is taken.

Control Collapse Model™

Organisations fail when decision authority fragments under pressure. This model maps the cascade from initial disruption through authority fragmentation to operational paralysis.

Decision AuthorityAuthority Fragmentation
Crisis Decision Hierarchy

Single authority. Clear escalation. No ambiguity. The structural prerequisite for coherent action under time pressure.

Single AuthorityEscalation Protocol
Failure Cascade Mapping

How small disruptions become systemic breakdowns. A diagnostic framework for identifying structural vulnerability before crisis reveals it.

Failure PatternsVulnerability Mapping
Operational Integrity Index

A measure of whether an organisation can still make coherent decisions. When this degrades, technical recovery becomes irrelevant.

Operational MetricsControl Measurement
Command Architecture

Incident Response RACI — Decision Rights Under Pressure

This is not a task assignment matrix. It is a command architecture. In crisis, the question is never "what needs to be done." It is "who decides, who acts, and who arbitrates when decisions conflict."

Cross-reference From the Frameworks page → · Detection · Triage · Containment · Eradication · Recovery — 8 authority roles · 5 lifecycle phases
Phase / Activity Incident
Commander
CSIRT /
SecOps
IT Ops /
SysAdmin
C-Suite /
Board
Legal &
Compliance
Comms
/ PR
Preparation
Define IR policy & playbooks A R C I C I
CSIRT roles, tooling & runbooks C A R I I I
Tabletop exercises & ATT&CK scenarios A R R C C C
Detection & Analysis
Monitor alerts & classify incident C A R I I I
Severity assessment & escalation trigger A R C C C I
Containment, Eradication & Recovery
Isolate affected systems A R R I I I
Forensics & evidence preservation C A R I A I
Eradicate threat & deploy controls A R R C C I
Restore services from clean state A C R C I C
Post-Incident & Regulatory
Root cause analysis A R C I C I
Regulatory notification (DORA/NIS2/GDPR) C C I A R C
External communications & disclosure C I I A C R
Update playbooks & policy revision A R C I C I
NCSC CAF 4-objective risk assessment structure for UK operators of essential services (OES) and regulated critical national infrastructure: Managing Security Risk, Protecting Against Cyber Attack, Detecting Cyber Security Events, Minimising Impact of Incidents Real-time decision authority during active incidents; board-level command escalation architecture Decision Rights Architecture™ + Board-Survivable Cyber Architecture™
ECAF (Ofgem) Electricity Cyber Assessment Framework — UK energy sector OES compliance layer built on CAF; Ofgem-enforced under NIS Regulations 2018; covers generation, transmission, distribution, and supply licensees; profile-based assessment against 14 CAF security principles mapped to operational technology and IT/OT convergence environments Operational technology incident command integration; cross-sector governance convergence where energy OES intersects financial and telecoms critical infrastructure Control Collapse Model™ + Recoverability Mandate™
UK NIS Regulations 2018 UK transposition of EU NIS Directive (SI 2018/506); imposes security and incident reporting obligations on OES across energy, transport, health, water, and digital infrastructure; enforced by sector-specific competent authorities (Ofgem, CAA, DfT, NHSE, NCSC); fines up to £17M for non-compliance Director-level personal liability; cross-sector governance architecture where a single incident spans multiple OES sectors simultaneously Board-Survivable Cyber Architecture™ + Recoverability Mandate™
A
Accountable — owns the outcome, single point of decision
R
Responsible — executes the work
C
Consulted — input before action
I
Informed — notified after action
Why This Matrix Exists

Most incident response failures are not caused by missing tools, delayed detection, or inadequate playbooks. They are caused by authority ambiguity — multiple stakeholders making conflicting decisions without a clear hierarchy.

The RACI matrix above encodes the Decision Rights Architecture™ into the NIST/SANS incident lifecycle. Every cell answers one question: when this activity is underway and conflict arises, who has the authority to arbitrate?

The matrix is aligned with NIST SP 800-61 Rev. 3 CSF 2.0 functions, ISO/IEC 27035-1:2023 incident management structure, and DORA Art. 17 ICT-related incident reporting requirements. With DORA active enforcement now in full operation — national competent authorities conducting on-site inspections, issuing compulsion payments, and cross-checking Register of Information data automatically (fines up to 2% of global turnover or €10M; ICT third-party providers face €5M plus 1% of daily global turnover for continued non-compliance) — and NIS2 penalties reaching €10M or 2% of revenue for essential entities with personal liability for managers under Art. 20, this matrix is designed to survive both operational and regulatory enforcement scrutiny. The SANS 2026 Workforce Report adds urgency: with 60% of organisations reporting skills gaps and 47% experiencing slower incident response, pre-mandated decision authority is no longer a governance preference — it is an operational necessity.

Operational Architecture

CSIRT & Crisis Command — Structural Integration

A CSIRT that operates without decision authority is a detection team. A CSIRT with explicit command architecture is a crisis response capability.

Cross-reference From the Frameworks page → · 3 layers of authority — Technical · Operational · Strategic — with regulated-estate override constraints
The Structural Problem

Most organisations build CSIRTs as technical teams within IT or security operations. They are staffed, trained, and equipped. They monitor, detect, and escalate. What they cannot do — because they were never given the mandate — is decide.

When a major incident requires decisions that cross business boundaries (shut down a revenue-generating system, notify a regulator before legal review is complete, override a vendor SLA), the CSIRT has visibility but no authority. It escalates. But escalation without clear command structure creates delay — and with CrowdStrike documenting 29-minute average breakout times and Unit 42 recording 72-minute exfiltration windows, delay is indistinguishable from total loss. The global average breach cost stands at $4.44M (IBM 2025), but U.S. costs rose to $10.22M. Healthcare leads at $7.42M. Ransomware is present in 44% of breaches (up from 32%), with IBM reporting ransomware-specific breach costs at $5.08M — 14% above the general average. 63% of victims now refuse payment (up from 59% in 2024), driving escalation toward destructive wiper payloads and direct-to-media extortion as adversary alternatives to ransom collection (IBM Cost of a Data Breach, 2025). In April 2026 alone: Adobe suffered exfiltration of 13M customer support tickets and 15,000 employee records; a LiteLLM supply chain attack turned developer endpoints into credential harvesting operations; and Middlesex County lost public safety systems to a single intrusion; ChipSoft (Netherlands, 7 Apr 2026) — the software provider managing patient records across the majority of Dutch hospital networks — was struck by ransomware, forcing patient record system outages across multiple healthcare facilities and exposing the compounded CSIRT problem: patient safety constraints override standard containment playbooks, meaning shutdown decisions require clinical authority that no security framework encodes (Z-CERT, Apr 2026); Gritman Medical Center (Idaho, Apr 2026) suffered ransomware-driven multi-location clinic closures across multiple sites, reinforcing ENISA's finding that healthcare accounts for a disproportionate share of high-impact OT/IT convergence incidents; and the FBI formally declared the China-linked (Salt Typhoon / MSS) breach of its DCSNet wiretap infrastructure a 'major incident' — the intrusion succeeded via a commercial ISP vendor embedded in FBI network infrastructure, not the FBI's own perimeter controls, demonstrating that third-party supply chain trust is an attack surface that no internal security posture can eliminate unilaterally (Bloomberg / HSToday, Apr 2026). On 9–10 April 2026, CPUID's download infrastructure was compromised for 19 hours: official CPU-Z and HWMonitor installers were silently replaced with trojanised executables carrying STX RAT — a remote access trojan deploying hidden VNC and Chrome credential theft via DLL side-loading (CRYPTBASE.dll, Zig-compiled). The threat actor had pre-staged C2 infrastructure since November 2025; no CPUID internal monitoring detected the substitution. Any CSIRT confronting this vector must simultaneously triage active credential theft, coordinate with a software vendor with no prior IR relationship, scope malware distribution across an unknown install base, and file a NIS2 early-warning notification within 24 hours — all while the threat actor pivots through harvested browser credentials. The same group previously compromised FileZilla distribution, indicating a deliberate targeting pattern against widely-trusted developer utilities (Hacker News / BleepingComputer, Apr 2026). Supply chain incidents have quadrupled in five years (Verizon DBIR 2025). The SANS 2026 Workforce Report confirms 47% of teams experience slower incident response due to skills gaps — meaning CSIRTs are simultaneously facing faster adversaries and degraded team capability. Organisations without pre-mandated decision authority absorb these costs at the upper end. ENISA's revised EU Blueprint for Cyber Crisis Management (2026) and the forthcoming CRA Single Reporting Platform (operational September 2026) add further mandatory reporting obligations that only a pre-mandated command structure can satisfy in time. ENISA's Threat Landscape 2025 (analysing 4,875 incidents, Jul 2024–Jun 2025) confirms the operational reality: DDoS accounts for 77% of reported incidents, AI-supported phishing now represents over 80% of social engineering activity, and public administration networks remain the primary target at 38% — validating that CSIRT operations face industrialised, AI-augmented adversary campaigns that outpace framework-speed governance. Rockstar Games (New York, April 2026) was struck by ShinyHunters ransomware, demonstrating that media-targeting extortion operations now follow structured playbooks that anticipate brand-led containment strategies — yet no CSIRT playbook maps the simultaneous intersection of intellectual property exposure, brand damage, regulatory notification, and ransom decision-making at adversary speed. Signature Healthcare Brockton Hospital (Massachusetts, April 2026) suffered Anubis ransomware that forced emergency room diversion and ambulance rerouting — reinforcing that healthcare CSIRT operations require clinical authority escalation paths that sit entirely outside the scope of NIST, SANS, ISO, and MITRE frameworks, and for which no industry standard encodes a decision sequence (Anubis, Apr 2026). CISA added six Known Exploited Vulnerabilities on 15 April 2026 — Fortinet FortiClient EMS, Adobe Acrobat Reader, Microsoft Windows, and Microsoft Exchange Server — mandating FCEB patch deadline 27 April 2026; all four products had active exploitation windows before public KEV listing, yet standard CSIRT playbooks contain no escalation protocol for the 48–72-hour pre-disclosure window when organisational exposure is highest and formal notification channels remain dormant (CISA KEV, Apr 2026). UAC-0247 (CERT-UA, Mar–Apr 2026) conducted sustained campaigns targeting Ukrainian government networks and municipal healthcare institutions — confirming that state-linked APT operations now systematically select environments where patient-safety constraints, regulatory notification obligations, and IT containment authority occupy three separate command hierarchies with no pre-mandated convergence architecture; the incident reinforces that CSIRT authority gaps are not an edge case but an engineered attack surface exploited by nation-state actors.

Tier 1 — Strategic Command

Board & C-Suite

Owns regulatory notification decisions. Owns payment decisions (ransomware). Owns public disclosure timing. Does not manage technical response. Receives structured briefings at defined intervals. Makes irreversible decisions with board mandate.

Tier 2 — Incident Command

Incident Commander

Single point of decision authority during active incident. Arbitrates conflicts between technical, legal, and business functions. Owns containment/eradication decisions. Escalates to Tier 1 at defined severity thresholds. This role is pre-mandated, not assigned during crisis.

Tier 3 — Operational Response

CSIRT / SecOps

Detection, triage, forensics, containment execution. Threat hunting using MITRE ATT&CK mapping. Evidence chain preservation (Evidence Chain Model™). Reports to Incident Commander. Executes, does not decide cross-functional matters.

Tier 4 — Support Functions

Legal, Comms, IT Ops, HR

Legal: regulatory notification, contractual obligations, litigation risk. Comms: stakeholder messaging, media protocol. IT Ops: system restoration, infrastructure recovery. HR: insider threat, staff communication, welfare. All report through Incident Commander.

Integration with Industry Frameworks

This command architecture is not an alternative to NIST, SANS, or ISO 27035. It is the governance layer that makes them operational under pressure.

NIST phases execute within Tier 3 (CSIRT). SANS operational sequence provides the tactical rhythm. ISO 27035 provides the documentation and audit structure. MITRE ATT&CK informs detection and threat hunting at the operational layer.

What this architecture adds is the decision layer: who commands, who arbitrates, and who makes the irreversible decisions that frameworks assume but do not define.

The Doctrine Position

Frameworks tell you what to do. Command architecture tells you who decides when what to do is disputed.

In every major incident that results in lasting organisational damage, the root cause is not a detection failure. It is a decision failure. The CSIRT saw the threat. Leadership could not agree on the response. Multiple functions made independent decisions. Those decisions contradicted each other. External parties — regulators, customers, media — observed the contradiction.

The organisation that enters crisis with pre-mandated decision authority, explicit escalation thresholds, and a tested command hierarchy will retain control. The organisation that defers this architecture until incident occurs will lose it.

Analytical Doctrine

MITRE ATT&CK — Adversary Visibility & Its Operational Limit

ATT&CK is the most comprehensive open catalogue of adversary behaviour ever published. It is also frequently mistaken for an incident-response playbook. This is the structural distinction — and what regulated operators must add to make ATT&CK operationally complete.

Cross-reference From the Frameworks page → · v19 live · 222 techniques · 475 sub-techniques · 56 campaigns
MITRE ATT&CK

Adversary Visibility — When Visibility Does Not Equal Action

MITRE ATT&CK v18 (October 2025) retired traditional Detections and Data Sources in favour of Detection Strategies and Analytics for every technique and sub-technique — the most significant structural change in years. v19 (28 April 2026) goes further: deprecating Defense Evasion entirely, splitting it into two new tactics — Stealth (TA0005, adversaries blending into legitimate behaviour) and Defense Impairment (TA0112, adversaries actively degrading security controls). This is not cosmetic. Stealth detection requires behavioural correlation across normal-appearing events. Impair Defenses detection requires monitoring for the absence of expected signals — a gap most SOCs have not addressed. Email Spoofing and Impersonation techniques are reorganised under a new Social Engineering technique. Enterprise now contains 222 Techniques and 475 Sub-Techniques across Kubernetes, CI/CD pipelines, container CLI/API, and cloud identity attack surfaces.

Where it breaks: v19's tactic restructuring and v18's detection analytics are significant improvements — but detection speed has not kept pace with adversary speed. CrowdStrike's 2026 GTR records a 29-minute average eCrime breakout, with the fastest observed breakout in 27 seconds. Unit 42 documents 72-minute exfiltration windows. Identity weaknesses played a material role in 90% of investigated incidents. ATT&CK now maps these techniques with precision. But organisations that see T1078 (Valid Accounts) on their dashboard still cannot act when the compromised identity belongs to a C-suite executive and legal, HR, and IT disagree on the containment action.

The real gap: ATT&CK tells you what the adversary is doing. It does not tell you what you should do when the adversary's actions create conflicting priorities across business units. When T1486 (Data Encrypted for Impact) is detected, the technical response is clear. The decision about payment, the decision about disclosure, the decision about business continuity — those are not in the ATT&CK matrix.

Doctrine position: ATT&CK v19 splits evasion into intent categories (Stealth vs. Impair Defenses) — an improvement. The Control Collapse Model™ provides the organisational map — where decision authority fragments, where communication breaks, and where recovery stalls. Knowing whether an adversary is hiding or destroying your defences is useful. Knowing who in your organisation has authority to act on that distinction under time pressure is essential.

● Live Intelligence · European Union · NIS2 · Real Estate & Property Sector

Live Threat Intelligence

Curated threat intelligence weighted for EU real estate operators, property asset managers, proptech platforms, and cross-border European property organisations. Sources: ENISA, CISA, CERT-EU, NCSC-UK/IE, Mandiant, CrowdStrike, Cloudflare Radar, Microsoft MSRC, The Register, and proprietary doctrine analysis. Last refresh: 4 May 2026.

Critical — ShinyHunters · Carnival 8.7M PII Published · Hospitality & Property Platform Data Exposure

ShinyHunters Publishes 8.7M Carnival Corporation PII Records and 9.4M Amtrak CRM Records — Targeting Pattern Directly Applicable to EU Real Estate, Proptech, and Serviced Accommodation Operators Holding Tenant and Guest Datasets

ShinyHunters publicly confirmed and dumped 8.7M PII records from Carnival Corporation (including names, dates of birth, and contact data) and 9.4M Salesforce CRM records from Amtrak within a 48-hour window ending 27 April. The targeting logic — organisations holding structured PII datasets of customers, guests, or users in CRM or sector-specific management platforms — has a direct read-across to EU real estate: residential letting platforms, property asset managers, hotel-residential and serviced-apartment operators, and proptech platforms managing tenant lifecycle data hold precisely the dataset profile ShinyHunters has now confirmed as their preferred target. For EU real estate operators under GDPR Article 32 obligations, two immediate risk dimensions arise: operational, in the form of whether bulk-export controls and access governance for property management and CRM platforms are adequate; and fraud exposure, in that cross-referencing the Carnival breach dataset against tenant or occupant records enables targeted social engineering and identity fraud against known property occupants — a risk vector that extends beyond the operator's own compliance position into tenant harm. The GDPR Article 33 72-hour notification obligation applies to controllers; ensuring the incident response path is documented before an event is the preventive governance priority.

Source: Cybernews (ShinyHunters/Carnival dump), SC Media (Amtrak brief), Ransomware.live, GDPR Articles 32/33, ENISA Threat Landscape 2026 — Updated 4 May 2026
High — NIS2 · EU Enforcement Active · Property Sector Scope

NIS2 Belgium 18 April First Hard Enforcement Milestone — 16% Readiness; Real Estate Operators with Digital Infrastructure Management, PropTech Platforms, and Smart Building OT Now Potentially In Scope as Important Entities

Belgium's 18 April NIS2 conformity-assessment deadline has passed with only 16% of in-scope organisations demonstrating readiness, and active audits now underway across Germany, France, and the Netherlands. For the EU real estate sector, NIS2 Article 2 scope questions are becoming operationally relevant: large property management platforms, digital infrastructure operators (data centre colocation, commercial managed real estate), and smart-building OT operators may qualify as 'important entities' under digital infrastructure or building management sub-categories. The threshold is 50+ employees or €10M+ turnover AND operation in a listed sector. EU property groups managing digital-building management systems, tenant experience platforms, or building automation networks should confirm their NIS2 scope determination is documented and legally advised. ENISA has published sector guidance noting that building management OT connected to corporate IT networks falls within the NIS2 critical infrastructure read for connected essential services.

Source: EnforcementTracker, NIS2 Directive (EU/2022/2555), ENISA Sector Guidance, Diamatix NIS2 Enforcement 2026 — Updated 4 May 2026
Critical — CERT-EU · EC Breach · Brussels Property & Tenant Risk

CERT-EU Confirms Second European Commission Breach 2026 — Brussels Commercial Property Operators With EU Institutional Tenants Should Apply Elevated Communications Verification Controls

CERT-EU has confirmed that a second breach of European Commission systems in 2026, attributed to TeamPCP, has exposed staff personal data and potentially compromised EC email infrastructure. For Brussels-based commercial property operators with EU institutional tenants — the Commission, European Parliament, Council of the EU, and EU agencies are among the largest office-space occupiers in the Brussels real estate market — the breach creates an indirect operational risk: property management communications involving security access provisioning, maintenance scheduling, building management system credentials, or lease-related financial transactions that appear to originate from EC staff accounts cannot be verified against the pre-breach trust baseline. Property managers should temporarily heighten identity-verification protocols for any requests purporting to originate from EC staff that involve building access changes, wire transfers, or system credential resets.

Source: CERT-EU, Security Affairs (EC breach), Digital Forensics Magazine April 2026, ENISA — Updated 4 May 2026
Critical — Salt Typhoon · EU CNI Third-Party Supplier Exposure

Salt Typhoon Chinese State Espionage — EU Critical Infrastructure Telecommunications Dependencies Confirmed Compromised; Real Estate Digital Infrastructure Operators in Carrier-Colocation Arrangements Carry Exposure

The CISA/NCSC joint advisory on Salt Typhoon confirms that Chinese state-sponsored actors achieved deep, persistent access to major carrier-grade telecommunications infrastructure, with European carriers among the affected parties. For EU real estate groups operating digital infrastructure — particularly data centre and colocation assets, smart city infrastructure, and commercial property with substantial bearer-network tenancies — the Salt Typhoon advisory raises a specific question about the carrier-level communications substrate of building management and security systems. BMS systems that communicate with control platforms via carrier networks rather than dedicated fibre are within the potential passive-collection scope. EU data centre operators and large commercial real estate groups with carrier-dependent BMS infrastructure should audit bearer-layer transport encryption across their managed estate.

Source: CISA/NCSC-UK Salt Typhoon Joint Advisory, ODNI 2026 Annual Threat Assessment, ENISA, BugITrix Nation-State 2026 — Updated 4 May 2026
Critical — FortiClient EMS CVE-2026-35616 · PropTech / BMS Vendor Risk

CVE-2026-35616 FortiClient EMS Under Active Exploitation — PropTech Platforms and Smart Building Operators Using Fortinet Endpoint Management Must Treat as Emergency Patch Obligation

Fortinet's emergency PSIRT advisory for CVE-2026-35616 confirms active exploitation of FortiClient Enterprise Management Server before patches were available. For the EU property sector, the risk is concentrated in two deployment categories: first, enterprise property management companies using Fortinet as the endpoint security management platform for their corporate IT estate; and second, smart building and building management system integrators who have deployed FortiClient on the IT/OT boundary of connected commercial properties. In the second category, a compromised FortiClient EMS instance provides the capability to modify or disable the endpoint security controls that enforce the separation between corporate IT and building management networks — potentially exposing HVAC, access control, lift, and energy management systems. Emergency patching is required; the normal change-management calendar is not appropriate for a confirmed actively-exploited vulnerability.

Source: Fortinet PSIRT Advisory CVE-2026-35616 (6 Apr 2026), CISA KEV, ENISA, SecurityWeek — Updated 4 May 2026
High — LockBit 5 · Construction Sector Active — Défcon5Italy, PropTech ERP Targeting Confirmed

LockBit 5 Confirms Italian Construction-Adjacent IT Services Firm (defcon5italy.com) as 27 April Victim — ERP and Project-Management SaaS Platforms in Property Development and Construction Remain Primary Pre-Encryption Enumeration Targets Across EU

The LockBit 5 affiliate disclosure of defcon5italy.com — an Italian IT services provider with construction and property sector client exposure — on 27 April 2026 confirms that the LockBit 5 affiliate model continues to specifically target construction-adjacent and property-sector technology providers as an indirect route into EU real estate development organisations. The attack vector pattern is consistent: IT service provider or ERP integrator compromise provides lateral access into the downstream property developer or asset manager estate without requiring direct phishing or vulnerability exploitation against the target. For EU real estate operators and property developers, the operative question is whether the ERP integrator, property management software vendor, or facilities management IT supplier operating within the estate has been assessed for ransomware exposure under NIS2 Article 21 supply-chain security obligations. Large EU property groups that achieved their own NIS2 compliance milestone while allowing unreviewed IT integrator access to project management, lease administration, or tenant data platforms remain exposed through the supply chain. Immediate action: audit third-party IT service provider access scope to property management systems, confirm each provider's patch cadence against the current ENISA advisory list, and verify that lateral-movement network segmentation prevents IT provider compromise from reaching core asset management data.

Source: Ransomware.live (defcon5italy.com, 27 Apr 2026), BlackFog State of Ransomware 2026, SharkStriker April 2026, NIS2 Article 21, ENISA Threat Landscape 2026 — Updated 4 May 2026

Intelligence feed refreshed 4 May 2026 — Weighted for Irish regulated entities under DPC, NCSC-IE, and CBI supervision. Sources: NCSC-IE, DPC, CBI, CISA, NCSC-UK, ENISA, Mandiant, CrowdStrike, Cloudflare Radar, Microsoft MSRC, Ransom-DB, Have I Been Pwned, and proprietary doctrine analysis.

Incident Domains

Major Incident Categories

Six major incident types. Each requires distinct decision architecture and recovery doctrine.

Ransomware

Enterprise Disruption. Control failure event with technical symptoms. Becomes major incident when core operations are disrupted, data integrity uncertain, authority fragmented.

Extortion AttackEncryption
Distributed Denial of Service

Operational Pressure. Attack is about which services survive sustained load. Decision architecture determines what remains available, degrades, abandoned.

AvailabilityService Prioritisation
Data Exfiltration & Breach

Information Compromise. Breach doctrine: identify scope, notify regulatory bodies, establish disclosure governance, restore stakeholder confidence.

Data IntegrityRegulatory Notification
Identity & Privileged Access Compromise

Access Doctrine. Attacker moves laterally with legitimate credentials. Access must be frozen, integrity verified, authority restored before systems return.

IAMCredential Compromise
Supply Chain Disruption

Cascade Doctrine. Third-party compromise spreads to core systems. Isolation, vendor accountability, upstream verification required. Organisation stops as a system.

TPRMVendor Risk
AI & Autonomous Systems

Non-Deterministic Failure. AI systems fail silently — producing plausible but wrong outputs. Traditional monitoring does not detect model drift, adversarial inputs, or training data poisoning. Blast radius determined by downstream decision dependencies.

AI GovernanceModel Risk
Major Incident Doctrine

Ransomware — Enterprise Disruption

Ransomware is not a cyber incident. It is a control failure event with technical symptoms.

Situation

Ransomware becomes a major incident when core operations are disrupted, data integrity is uncertain, and decision authority becomes fragmented.

Organisations often respond with paralysis. Attack teams move fast. Decision teams move slowly. Authority splits into technical response, legal liability, payment consideration, disclosure governance, and board notification.

This fragmentation is where control collapses.

First 60 Minutes: Control Establishment Protocol

Assign single decision authority. Board-mandated incident commander. One person. One decision chain. Speed increases when authority is single.

Halt uncontrolled system changes. Do not confuse urgency with direction. Lock all non-isolated systems. Preserve evidence integrity. Freeze all non-essential system changes.

Isolate affected environments logically, not blindly. Segment based on control plane, not just network. Preserve backups offline.

Establish communication cadence. Board briefing: minute 15, 30, 60. Stakeholder notification: minute 45. Regulatory notification: based on legal mandate (usually within 72 hours).

Decision Architecture: Five Parallel Tracks

Track 1 — Containment: Isolate affected systems. Verify isolation. Document evidence. Preserve forensics. Scope assessment. Does threat continue to spread?

Track 2 — Operational Continuity: Which systems restore first? Which operations are non-negotiable? Business continuity plan activation. Failover decisions. RTO/RPO enforcement.

Track 3 — Payment Consideration: Do not delegate. Board-level decision. Legal/regulatory consultation. Law enforcement notification. Negotiation only after board decision. Track payments if made.

Track 4 — Disclosure Governance: Who knows? Who needs to know? Regulatory filing thresholds. Customer notification timelines. Media response. Board communication.

Track 5 — Recovery Doctrine: Systems return online. Control must return to leadership. If incident commander walked into a structure that was already fragmented, fragmentation returns.

Board-Level Questions
  • Can the incident commander make a payment decision, or must that escalate to the board?
  • What is the RTO for critical operations? Is backup restoration realistic or aspirational?
  • Which regulators must be notified? What are the timelines?
  • What happens to customer data if recovery fails? What is the disclosure plan?
  • What is the organisational narrative? (Story matters. Narrative controls the regulatory response.)
Failure Modes

Fragmentation: Multiple decision makers. Multiple decisions. No alignment. Speed increases. Control decreases. By hour 4, no one knows who decided what.

Technical Confidence: Dashboards show activity. Leadership assumes progress. Reality: direction is absent.

Payment Negotiation Before Control: Attackers negotiate while organisation still cannot define scope. Payment becomes higher. Decryption tools unreliable. Recovery remains impossible.

Disclosure Delay: Regulators expect notification within 72 hours. Delaying to "understand scope" creates secondary breach. Notification is mandatory.

Operational Restart Without Verification: Systems restore. But backups were poisoned. Attacker returns. Control did not return.

Recovery Doctrine

Systems returning online is not recovery. Control returning to leadership is.

Organisations that restore systems but do not restore decision authority remain operationally unstable. This is where secondary incidents originate.

Verification: All systems must prove integrity before acceptance. Cryptographic attestation. Not visual inspection.

Structural Analysis: Why did this succeed? What control failed? Answer before resuming normal operations.

Authority Restoration: Incident commander hands control back to permanent leadership. Decision authority becomes consolidated again. Single strategic voice.

Operational Doctrine

DDoS — Service Availability Under Pressure

DDoS is not about attack. It is about which services survive sustained pressure.

Situation

DDoS becomes a major incident when critical customer-facing services degrade or fail. Unlike ransomware, data is not exfiltrated. But reputation, revenue, and trust are lost in minutes.

Decision architecture must answer: Which services must stay available? What degrades acceptably? What can be abandoned?

First 60 Minutes: Prioritisation Protocol

Identify critical services. Not all services have equal value. Payment processing outage is existential. Marketing website outage is reputational.

Activate DDoS mitigation. Upstream filtering, capacity increase, geographic load distribution.

Establish customer communication. Status page active. Public messaging. Board briefing. Regulatory notification if mandated.

Measure duration. Is attack sustained? Is attacker escalating? Or is this brief probe?

Decision Architecture: Service Hierarchy

Tier 1 (Survive): Payment systems. Authentication systems. Core operational systems. This tier must remain available.

Tier 2 (Degrade Acceptably): Customer portals. Reporting systems. Capacity can reduce. Performance degrades. Availability maintained.

Tier 3 (Abandon): Analytics. Marketing automation. Reporting dashboards. Can be shutdown without operational impact. Restore after attack ceases.

Failover decision: Geographic isolation, service shedding, rate limiting. Which tool applies to which service?

Failure Modes

Indiscriminate Mitigation: Shutdown all services to protect one. Result: attacker wins. Everything is offline.

Inadequate Capacity Planning: Normal load is close to capacity limit. Attack adds 10x load. Organisation cannot handle it.

No Decision Authority: Network team sheds traffic. Application team disagrees. Support team makes promises. No coordinated response.

External Dependency: DDoS mitigation is ISP-dependent. ISP cannot scale. Organisation is hostage to external capacity.

Recovery Doctrine

Recovery is stability under load, not absence of attack.

Organisations that restore service only when attack stops are not recovered. They are temporarily lucky.

Load Testing: After attack ceases, simulate attack load. Can systems sustain it? Or do they cascade?

Capacity Increase: Attack exposed capacity limits. Increase them. Permanently.

Supplier Accountability: ISP/CDN provider failed? Contract renegotiation. Backup provider activation. Do not remain dependent on single supplier.

Breach Doctrine

Data Exfiltration & Breach — Information Compromise

Breach doctrine: identify scope, notify regulatory bodies, establish disclosure governance, restore stakeholder confidence.

Situation

Data exfiltration becomes a major incident when personal, financial, or proprietary data leaves the organisation's control. Scope is unknown. Attacker retains copy indefinitely.

Regulatory response is mandatory. GDPR, CCPA, sector-specific regulations all require notification. Delay creates secondary breach.

First 60 Minutes: Scope & Notification

Identify data type. Is data encrypted in transit and at rest? Was encryption bypassed? Or was data exfiltrated unencrypted?

Quantify scope. How many records? What data elements? Personal identifiers or just usernames?

Regulatory notification. Most jurisdictions require notification within 72 hours. Begin drafting notification immediately. Do not wait for investigation completion.

Customer communication plan. What will you tell affected customers? When? Via what medium?

Decision Architecture: Five-Track Response

Track 1 — Forensics: What was exfiltrated? When? How? Preserve evidence. Do not overwrite logs.

Track 2 — Regulatory Notification: GDPR: 72 hours. CCPA: "without unreasonable delay." Other jurisdictions: varies. Do not delay for investigation completion.

Track 3 — Customer Notification: Affected customers must be informed. Notification must contain: what data, why, what steps organisation is taking, what customers should do.

Track 4 — Credit Monitoring: If financial or identity data exfiltrated, offer credit monitoring for 12–24 months. Regulatory requirement in many jurisdictions.

Track 5 — Containment: Stop the bleeding. Close the exfiltration vector. Isolate affected systems. Verify attacker cannot continue.

Board-Level Questions
  • Can scope be determined quickly, or is investigation ongoing?
  • What is the regulatory exposure? Which regulators must be notified?
  • What is the customer notification message? What are the financial implications?
  • Does the organisation have cyber insurance? Can it cover breach costs?
  • What is the organisational narrative for the market? (Third-party breach vs. internal failure = different message)
Failure Modes

Scope Creep: Investigation reveals more data than initially assessed. Each wave of discovery requires new notification. Regulatory exposure increases.

Notification Delay: Waiting for perfect investigation = regulatory violation. Notification is mandatory. Incomplete investigation is acceptable. Update regulators as scope becomes clear.

Inadequate Customer Communication: "We had a breach" is not notification. Notification requires specificity: what data, why it matters, what customers should do.

No Credit Monitoring: Many jurisdictions mandate credit monitoring for identity data breaches. Omitting it creates secondary regulatory violation.

Recovery Doctrine

Recovery is trust restoration, not data recovery (data is gone).

Stakeholder Communication: Continuous. Weekly updates to affected customers. Regulatory reports on containment progress. Board updates on resolution.

Root Cause Mitigation: Why did exfiltration succeed? Control failure? Third-party compromise? Fix it. Permanently.

Trust Signals: Third-party audit. Security certification. Regulatory validation. Visible restoration of controls.

Access Doctrine

Identity & Privileged Access Compromise

Attacker moves laterally with legitimate credentials. Access must be frozen, integrity verified, authority restored before systems return.

Situation

Identity compromise is the most dangerous major incident. Attacker has legitimate access. They look like an insider. Detection is hard. Scope is unclear.

If privileged accounts are compromised, attacker can create backdoors, steal data, modify logs, and maintain persistence indefinitely.

First 60 Minutes: Credential Freeze Protocol

Identify compromised credentials. Which accounts? Privileged or standard? How long were they active?

Freeze all affected credentials. Force password reset. Revoke API keys. Revoke session tokens. Do not wait for investigation.

Identify lateral movement. Where did attacker go? What systems were accessed? What data was touched?

Verify system integrity. Attacker may have created backdoor accounts. Search for: new user accounts, privilege escalations, new services, modified logs.

Decision Architecture: Access Restoration

Tier 1 — Credential Remediation: All affected credentials revoked. New credentials issued. Force re-authentication across organisation.

Tier 2 — Backdoor Elimination: Identify all attacker-created access points. Remove them. Verify removal.

Tier 3 — System Integrity Verification: All systems touched by attacker must prove integrity before re-entry. Cryptographic attestation. Not visual inspection.

Tier 4 — Privilege Re-Establishment: Affected privileged users must re-validate. Identity verification. Capability verification. Slow re-certification of privilege.

Failure Modes

Incomplete Credential Freeze: Attacker still has one valid credential. Attacker re-enters systems. Incident recycles.

Missed Backdoors: Attacker created hidden user accounts, API keys, or SSH access. Organisation believes incident is closed. Attacker remains.

Premature System Restoration: Systems restored before integrity verification complete. Attacker's modifications persist.

No Privilege Re-Certification: Privileged accounts restored to same users without re-validation. If attacker stole password, attacker regains access immediately.

Recovery Doctrine

Recovery is trustworthy identity, not fast identity restoration.

Identity System Audit: All access control systems must be audited. Active Directory, Okta, privilege management tools. Attacker may have modified these directly.

Privilege Model Redesign: Why did attacker succeed with legitimate credentials? Privilege was too broad. Principle of least privilege must be enforced.

Continuous Verification: Identity compromise requires ongoing suspicion. Behaviour analytics. Access pattern anomaly detection. Continuous monitoring.

Cascade Doctrine

Supply Chain Disruption

Third-party compromise spreads to core systems. Isolation, vendor accountability, upstream verification required. Organisation stops as a system.

Situation

Supply chain incidents are distinctive. Organisation did not fail. Vendor failed. But organisation's systems are compromised.

Scope is unclear because vendor's scope is unclear. Remediation is slow because vendor drives timeline. And organisation may not even know it was compromised until attacker activates payload.

First 60 Minutes: Vendor Isolation & Assessment

Identify vendor compromise. Which product? Which version? When was it deployed?

Isolate vendor systems. If possible, network-isolate all affected systems. If isolation is dangerous (critical production), plan isolation carefully.

Assess organisational exposure. Which systems run vendor software? Which data is accessible? What is the blast radius?

Vendor communication. Request immediate technical briefing. What do they know? What have they not told you?

Decision Architecture: Isolation & Remediation

Track 1 — Network Isolation: Affected systems isolated from internet. Air-gapped if possible. Limits attacker's exfiltration capability.

Track 2 — Vendor Patch Timeline: When is patch available? Is organisation willing to patch production immediately, or does testing delay patch deployment?

Track 3 — Upstream Verification: Have other customers been compromised? Is vendor being transparent? Are regulators aware?

Track 4 — System Integrity: Even after patching, system integrity is suspect. May need rebuild from clean backup or full replacement.

Track 5 — Vendor Accountability: Contract renegotiation. Remediation timelines. Financial responsibility. Consider vendor replacement.

Failure Modes

Vendor Defensiveness: Vendor denies compromise or minimises severity. Organisation waits for truth. Delay increases exposure.

Slow Patch Deployment: Vendor takes weeks to release patch. Organisation is exposed. Patch is eventually forced, but window was long.

Insufficient Isolation: Affected system remains connected to network. Attacker continues lateral movement. Isolation was incomplete.

No Supply Chain Verification: Organisation did not verify upstream vendors. Vendor itself compromised its supplier. Chain extends further than expected.

Recovery Doctrine

Recovery is vendor independence and supply chain resilience.

Vendor Redundancy: Critical systems should have backup vendor. If primary vendor fails, secondary takes over. No single vendor should be mission-critical.

Supply Chain Audit: All vendor products must be periodically audited. Not just compliance checks. Security assessment. Code review if possible.

Contract Clauses: Contracts must include: security incident notification, remediation timeline commitments, liability for breach, supply chain transparency.

Emerging Doctrine

AI & Autonomous Systems — Incident Command

When AI systems fail, traditional incident response fails with them. Decision authority must adapt to non-deterministic systems, adversarial manipulation, and cascading model failures.

The Situation

AI systems are now embedded in critical business processes: fraud detection, credit decisioning, clinical triage, autonomous operations, content moderation. When these systems fail or are compromised, the failure mode is fundamentally different from traditional IT incidents.

Key differences: AI failures are often silent — the system continues to operate but produces wrong outputs. Traditional monitoring does not detect model drift, adversarial inputs, or training data poisoning. The blast radius is determined by how many downstream decisions depend on the compromised model.

Threat vectors (April 2026): AI-powered attacks have increased 340% since 2024; organisations face an average of 1,200 AI-enhanced attack attempts per day (WEF). Prompt injection attacks specifically rose 340% year-on-year — a single crafted sentence embedded in a document the AI was asked to summarise will instruct the model to ignore its rules and execute new ones. 59% of organisations experienced at least one deepfake attack. Arup lost $25M to a deepfake CFO video conference. Real-time voice cloning operates from seconds of audio, authorising fraudulent transfers that bypass verbal verification protocols. Adversarial inputs bypass classification models. Training data poisoning corrupts behaviour over weeks without triggering alerts. Model extraction attacks steal proprietary capabilities at scale. Agentic AI systems introduce autonomous attack chains operating without human oversight; a single over-privileged API token or misconfigured memory buffer exposes enterprise data at machine speed. The adversary no longer targets the human. They co-opt the automated employee — the agent the human built to act on their behalf.

First 60 Minutes

Minute 0–15 — Model Isolation: Identify all systems consuming output from the compromised AI model. Determine blast radius: how many business decisions are affected? Switch to manual fallback or rule-based override. Do not wait for root cause analysis to begin isolation.

Minute 15–30 — Decision Authority: AI incidents require cross-functional command. Data science alone cannot arbitrate business impact. Establish incident commander with authority over: model rollback decisions, customer communication, regulatory notification, and business continuity.

Minute 30–60 — Impact Assessment: Determine: how long has the model been compromised? How many decisions were affected? Are those decisions reversible? What is the regulatory exposure (EU AI Act, sector-specific requirements)? Begin evidence preservation for forensic analysis of model behaviour, training data, and inference logs.

Decision Architecture

Track 1 — Model Containment: Rollback to last known-good model version. If no clean version exists, switch to deterministic rules engine. Accept degraded performance over compromised AI output.

Track 2 — Impact Quantification: Enumerate every decision made by the compromised model during the exposure window. Classify decisions by reversibility: fully reversible, partially reversible, irreversible. Prioritise remediation of irreversible decisions.

Track 3 — Regulatory & Legal: EU AI Act requires incident reporting for high-risk AI systems. Determine classification of affected AI system. Prepare notification to relevant supervisory authority. Document all containment actions taken.

Track 4 — Stakeholder Communication: Customers whose decisions were affected by compromised AI must be notified. Board requires briefing on AI risk exposure. Regulators require technical incident report with model performance data.

Track 5 — Root Cause & Hardening: Was this adversarial attack, data poisoning, model drift, or infrastructure compromise? Implement model monitoring (input validation, output anomaly detection, drift detection). Establish AI-specific incident playbooks.

Failure Modes

Silent Degradation: AI model produces plausible but incorrect outputs. No alerts trigger. Downstream decisions accumulate errors over weeks. By the time detection occurs, remediation scope is massive.

Adversarial Exploitation: Attacker manipulates model inputs to produce desired outputs. Fraud detection model approves fraudulent transactions. Content moderation model approves prohibited content. Organisation does not detect manipulation because model metrics appear normal.

Cascade Through Dependencies: One compromised model feeds data to three other models. Downstream models inherit corrupted inputs. Error propagates through ML pipeline. Blast radius exceeds initial assessment because dependency mapping was incomplete.

Regulatory Exposure: Organisation fails to report AI incident within required timeframe. Regulatory authority determines AI system was high-risk under EU AI Act. Penalty is assessed not just for the incident but for failure to classify, monitor, and report.

Recovery Doctrine

Recovery from AI incidents requires more than model retraining.

Model Governance: Implement model inventory with risk classification. Every AI model in production must have: owner, risk tier, monitoring dashboard, rollback procedure, and manual fallback process.

Continuous Validation: Deploy automated model monitoring: input distribution monitoring, output anomaly detection, performance drift alerts, adversarial input detection. Alert thresholds must be set by business impact, not just statistical deviation.

AI Incident Playbook: Traditional IR playbooks do not cover AI-specific scenarios. Develop playbooks for: model compromise, training data poisoning, adversarial attack, model extraction, and AI-generated social engineering.

Board-Level AI Risk: Board must understand AI risk exposure. Quarterly AI risk briefing covering: model inventory, incident history, regulatory compliance status, and emerging threat vectors (deepfakes, prompt injection, autonomous system failures).

EU ESTATES RISK · 1 May 2026

CISA/NCSC China-nexus botnet advisory: OT/BMS (Building Management System) environments explicitly cited as at-risk from Volt Typhoon/Flax Typhoon shared covert networks. DORA supplier chain: PropTech and estate management ICT providers subject to EBA/ENISA joint examination. NIS2

Contact Email Direct