Think Fast, Act Faster: Incident Response That Works
When a cyber incident strikes, the difference between calm, decisive action and chaotic cleanup often comes down to preparation.
During ANM’s recent webinar, our experts Kevin Snoddy, Cybersecurity Solution Architect, and Agustin (Augie) Lozano, Solutions Architect, shared hard-earned lessons from the field on how organizations can strengthen their incident response (IR) strategies.
This blog highlights the key takeaways, framed by the NIST Cybersecurity Framework, and offers practical guidance you can apply today.
Preparation Defines Success
Most incident response failures aren’t due to sophisticated attackers, but to unprepared organizations. Common pitfalls include:
- No clear asset inventory
- Limited or missing logging
- Weak identity and access hygiene
- No 24/7 monitoring
- IR plans that exist on paper but have never been practiced
As Kevin noted, “Preparation before detection makes or breaks incident response.”
The NIST Cybersecurity Framework in Practice
The five functional areas of NIST (Identify, Protect, Detect, Respond, Recover) provide the foundation for a repeatable and resilient IR process.
Identify
You can’t protect what you don’t know exists. Maintaining an accurate asset inventory is critical, especially in hybrid environments. Regular audits must include endpoints, workloads, applications, accounts, and data flows. Risk assessments then help you prioritize where to focus.
Protect
Protecting isn’t just blocking attacks; it’s reducing the blast radius. Over-permissioned accounts, stale credentials, and incomplete MFA deployments are recurring culprits in breaches. Regular audits, patching, hardening, and backups form the core of protection.
Detect
Detection is more than a SIEM lighting up with alerts. Effective detection means tuning signals to align with business risk and understanding what “normal” looks like in your environment. Without this, alert fatigue sets in, and critical anomalies are missed.
Respond
When an incident occurs, speed and clarity matter. Organizations that respond well have:
- Tested playbooks
- Regular tabletop exercises across IT, security, leadership, and legal
- Out-of-band communication channels
- Processes for preserving logs and forensics
Recover
Recovery is not simply getting systems back online—it’s about maturing. Post-incident reviews must capture what worked, what failed, and how to prevent recurrence. As Kevin put it, “Don’t waste the pain. Use it to get better.”
Strengthening Your IR Capabilities
Augie Lozano emphasized several strategies organizations can adopt today:
- IR Retainers: A retainer ensures rapid expert engagement during a breach. Unlike cyber insurance, which covers costs, retainers provide hands-on support when every minute counts.
- Managed Detection and Response (MDR): For organizations without 24/7 SOC coverage, MDR providers offer continuous monitoring, rapid response, and advanced threat detection at a fraction of the cost of building an internal team.
- Workshops & Readiness Assessments: Exercises like ANM’s Cyber Resilient Architecture workshop help identify gaps, refine playbooks, and strengthen cross-team coordination.
Building True Resilience
The underlying theme of the session was clear: readiness is everything. Incidents are not a matter of “if” but “when.” Organizations that build muscle memory through documentation, testing, and rehearsal respond faster, lose less, and build trust across their business.
Watch the Full Webinar
This blog only scratches the surface. To hear Kevin and Augie walk through real-world scenarios, practical recommendations, and deeper technical insights, watch the full webinar recording: Think Fast, Act Faster: Incident Response That Works.
Cisco 360: What the New Partner Program Means for Customers and Why It Matters
Cisco has officially launched Cisco 360, a complete overhaul of its iconic partner program, and it’s more than a structural refresh. It’s a strategic shift that aligns how partners are measured, rewarded, and discovered with how customers actually buy, deploy, and...
SASE: The New Baseline for Modern Enterprise Security
For years, networks were built like fortresses—everything tucked safely inside a data center with a hard perimeter and a single drawbridge. It worked when users and applications lived inside the walls. That world is gone. Today’s reality is simple: Users are...
Microsoft 365 Pricing & Feature Updates Coming July 1, 2026: What It Means for You
Microsoft has announced a major update to Microsoft 365 and Office 365 plans, effective July 1, 2026. While this includes a price increase for some SKUs, it also delivers significant added value by bundling advanced security and management features that previously...


