Think Fast, Act Faster: Incident Response That Works

September 4, 2025

When a cyber incident strikes, the difference between calm, decisive action and chaotic cleanup often comes down to preparation.

During ANM’s recent webinar, our experts Kevin Snoddy, Cybersecurity Solution Architect, and Agustin (Augie) Lozano, Solutions Architect, shared hard-earned lessons from the field on how organizations can strengthen their incident response (IR) strategies.

This blog highlights the key takeaways, framed by the NIST Cybersecurity Framework, and offers practical guidance you can apply today.

Think Fast Sign

Preparation Defines Success

Most incident response failures aren’t due to sophisticated attackers, but to unprepared organizations. Common pitfalls include:

  • No clear asset inventory
  • Limited or missing logging
  • Weak identity and access hygiene
  • No 24/7 monitoring
  • IR plans that exist on paper but have never been practiced

As Kevin noted, “Preparation before detection makes or breaks incident response.”

The NIST Cybersecurity Framework in Practice

The five functional areas of NIST (Identify, Protect, Detect, Respond, Recover) provide the foundation for a repeatable and resilient IR process.

Identify

You can’t protect what you don’t know exists. Maintaining an accurate asset inventory is critical, especially in hybrid environments. Regular audits must include endpoints, workloads, applications, accounts, and data flows. Risk assessments then help you prioritize where to focus.

Protect

Protecting isn’t just blocking attacks; it’s reducing the blast radius. Over-permissioned accounts, stale credentials, and incomplete MFA deployments are recurring culprits in breaches. Regular audits, patching, hardening, and backups form the core of protection.

Detect

Detection is more than a SIEM lighting up with alerts. Effective detection means tuning signals to align with business risk and understanding what “normal” looks like in your environment. Without this, alert fatigue sets in, and critical anomalies are missed.

Respond

When an incident occurs, speed and clarity matter. Organizations that respond well have:

  • Tested playbooks
  • Regular tabletop exercises across IT, security, leadership, and legal
  • Out-of-band communication channels
  • Processes for preserving logs and forensics

Recover

Recovery is not simply getting systems back online—it’s about maturing. Post-incident reviews must capture what worked, what failed, and how to prevent recurrence. As Kevin put it, “Don’t waste the pain. Use it to get better.”

Strengthening Your IR Capabilities

Augie Lozano emphasized several strategies organizations can adopt today:

  • IR Retainers: A retainer ensures rapid expert engagement during a breach. Unlike cyber insurance, which covers costs, retainers provide hands-on support when every minute counts.
  • Managed Detection and Response (MDR): For organizations without 24/7 SOC coverage, MDR providers offer continuous monitoring, rapid response, and advanced threat detection at a fraction of the cost of building an internal team.
  • Workshops & Readiness Assessments: Exercises like ANM’s Cyber Resilient Architecture workshop help identify gaps, refine playbooks, and strengthen cross-team coordination.

Building True Resilience

The underlying theme of the session was clear: readiness is everything. Incidents are not a matter of “if” but “when.” Organizations that build muscle memory through documentation, testing, and rehearsal respond faster, lose less, and build trust across their business.

Watch the Full Webinar

This blog only scratches the surface. To hear Kevin and Augie walk through real-world scenarios, practical recommendations, and deeper technical insights, watch the full webinar recording: Think Fast, Act Faster: Incident Response That Works.

SASE: The New Baseline for Modern Enterprise Security

SASE: The New Baseline for Modern Enterprise Security

For years, networks were built like fortresses—everything tucked safely inside a data center with a hard perimeter and a single drawbridge. It worked when users and applications lived inside the walls. That world is gone. Today’s reality is simple: Users are...