Skip to main content

Destructive Events

Preparing for the Crisis and Rebuilding Trust

Columns
Service
Cyber Security & Technology Risk
Use cyber security to protect your future.

Imagine the screens going black—not in one office, but across your global operations. It’s not a ransomware demand blinking on the screen, but something more final: data is gone, systems are wiped, and operations are at a complete standstill. This isn't a hypothetical scenario; it's a destructive event, and it represents a new, more menacing chapter in cyber threats.

Beyond technical devastation, the most profound casualty in such a crisis is trust. The trust of your clients, who depend on your services; the trust of regulators; and the trust of your own people, who rely on the stability of the business. In the face of a destructive attack, recovery is not just about restoring systems from a backup. It is about regaining control and the strategic imperative to rebuild confidence with every stakeholder. These events are a reminder that preparation for such a crisis is critical.

Approach

A robust response plan is essential, but as shared previously Why incident response plans don't fly – a plan that has not been pressure-tested is merely a document. Destructive attacks can expose nuanced gaps, proving that true resilience is forged through technical and human response elements. Here are a few examples of how leading organizations are turning preparation into a strategic advantage, building both operational and reputational resilience:

Preparation Strategy

Actionable Considerations for Leadership

Emergency Isolation protocols

Establish and test 'airplane mode' protocols. Ensure technical break-glass processes exist to quickly isolate both physical and virtual systems to minimize the blast radius of an incident. This may also require developing internal tools and automation to support.

Tabletop Exercises

Go beyond simple ransomware scenarios and pressure test more advanced destructive topics. This should include applying pressures of a real crisis like “How would you develop and test secure communication channels for use when corporate systems are inaccessible?”, “How would you share the status of your business to clients?”, or “What would you tell employees?”.

Breach Risk & Compromise Assessment

Assess your environment for misconfigurations, toxic configuration combinations and close breach pathways before attackers can exploit them. Identify signals pointing to existing compromises so that you can resolve them before they become major incidents.

Adversary Simulations

Take discussion-based exercises a step further by engaging in hands on testing. This can be "red team" versus "blue team" drills or control enumeration using breach resilience solutions that actively simulate the tactics of a real-world adversary.

Disaster Recovery (DR)

In the context of a destructive attack, traditional DR plans may fall short. It's critical to review and test your DR strategy specifically for a destructive malware scenario and make sure backups are protected. Consider “can you execute an emergency isolation while balancing the forensic investigation and recovery?”. Lastly, practicing these "break-glass" procedures is paramount.

The Journey

Navigating the complexities of a destructive event requires more than just a plan; it requires experience and external collaboration. Recovering technically is only the beginning. The journey to restoring trust requires a deliberate strategy built on transparency, legal counsel, and objective validation. A prominent example is our work supporting the response to the SolarWinds cyber-attack (working together to mitigate the threat of future malware attacks).

The time to prepare is now. By embracing a proactive mindset and turning preparation into a continuous practice, you can build a mindset that is not just ready to respond but is positioned to protect trust. 

Explore more

Meet our team

Image of David Nides
David Nides
Principal, Advisory, KPMG US

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.
All fields with an asterisk (*) are required.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline