Think Fast, Act Faster: Incident Response That Works
When a cyber incident strikes, the difference between calm, decisive action and chaotic cleanup often comes down to preparation.
During ANM’s recent webinar, our experts Kevin Snoddy, Cybersecurity Solution Architect, and Agustin (Augie) Lozano, Solutions Architect, shared hard-earned lessons from the field on how organizations can strengthen their incident response (IR) strategies.
This blog highlights the key takeaways, framed by the NIST Cybersecurity Framework, and offers practical guidance you can apply today.
Preparation Defines Success
Most incident response failures aren’t due to sophisticated attackers, but to unprepared organizations. Common pitfalls include:
- No clear asset inventory
- Limited or missing logging
- Weak identity and access hygiene
- No 24/7 monitoring
- IR plans that exist on paper but have never been practiced
As Kevin noted, “Preparation before detection makes or breaks incident response.”
The NIST Cybersecurity Framework in Practice
The five functional areas of NIST (Identify, Protect, Detect, Respond, Recover) provide the foundation for a repeatable and resilient IR process.
Identify
You can’t protect what you don’t know exists. Maintaining an accurate asset inventory is critical, especially in hybrid environments. Regular audits must include endpoints, workloads, applications, accounts, and data flows. Risk assessments then help you prioritize where to focus.
Protect
Protecting isn’t just blocking attacks; it’s reducing the blast radius. Over-permissioned accounts, stale credentials, and incomplete MFA deployments are recurring culprits in breaches. Regular audits, patching, hardening, and backups form the core of protection.
Detect
Detection is more than a SIEM lighting up with alerts. Effective detection means tuning signals to align with business risk and understanding what “normal” looks like in your environment. Without this, alert fatigue sets in, and critical anomalies are missed.
Respond
When an incident occurs, speed and clarity matter. Organizations that respond well have:
- Tested playbooks
- Regular tabletop exercises across IT, security, leadership, and legal
- Out-of-band communication channels
- Processes for preserving logs and forensics
Recover
Recovery is not simply getting systems back online—it’s about maturing. Post-incident reviews must capture what worked, what failed, and how to prevent recurrence. As Kevin put it, “Don’t waste the pain. Use it to get better.”
Strengthening Your IR Capabilities
Augie Lozano emphasized several strategies organizations can adopt today:
- IR Retainers: A retainer ensures rapid expert engagement during a breach. Unlike cyber insurance, which covers costs, retainers provide hands-on support when every minute counts.
- Managed Detection and Response (MDR): For organizations without 24/7 SOC coverage, MDR providers offer continuous monitoring, rapid response, and advanced threat detection at a fraction of the cost of building an internal team.
- Workshops & Readiness Assessments: Exercises like ANM’s Cyber Resilient Architecture workshop help identify gaps, refine playbooks, and strengthen cross-team coordination.
Building True Resilience
The underlying theme of the session was clear: readiness is everything. Incidents are not a matter of “if” but “when.” Organizations that build muscle memory through documentation, testing, and rehearsal respond faster, lose less, and build trust across their business.
Watch the Full Webinar
This blog only scratches the surface. To hear Kevin and Augie walk through real-world scenarios, practical recommendations, and deeper technical insights, watch the full webinar recording: Think Fast, Act Faster: Incident Response That Works.
Modern Observability: From Reactive Monitoring to Proactive, Business-Aligned Insight
As IT environments continue to expand across hybrid infrastructure, cloud platforms, and distributed applications, the challenge isn’t a lack of data—it’s making sense of it fast enough to act. That’s where modern observability comes in. In a recent ANM Pathways...
Next-Generation Disaster Recovery: Building Cyber Resilience Before the Next Attack
Downtime is no longer hypothetical. Ransomware, supply chain attacks, cloud outages, power failures, and natural disasters can bring even well-funded IT organizations to their knees — and the consequences go far beyond an inconvenient afternoon. Financial losses,...
Managing IT Inflation Without Sacrificing Outcomes
Technology has always changed quickly. What’s different now is how fast costs are rising and how often organizations are caught off guard. Across software subscriptions, infrastructure hardware, and cloud platforms, many IT leaders are seeing budgets hold steady while...


