How to Reassure Stakeholders When Facts Are Still Unknown During Cyber Incidents
Ops gets the first call and the flood of questions. The hard part: you rarely have full facts in the first hours. Your job is to reduce uncertainty, buy time, and protect trust without guessing. That takes scenario planning and tight coordination between legal and communications.
What to say when you don't have all the answers
- Acknowledge the issue: Confirm you're aware and treating it as a priority.
- State what's known: Keep it specific and verifiable. No assumptions.
- State what's unknown: Say it directly to avoid future walk-backs.
- Explain what you're doing: Investigation steps, containment, and who's involved.
- Give next steps for them: Any precautionary actions and where to get updates.
- Set the next update time: Give a clock time, not "soon." Then meet it.
Example holding statement: "We're investigating a security incident that is affecting a subset of systems. At this time, we have contained the activity and engaged third-party specialists. We have not confirmed any unauthorized access to personal data and will update by 3:00 p.m. UTC. Customers do not need to take action right now. Status updates will be posted at status.example.com."
Build a message system, not one-off statements
- Message modules: Pre-write short blocks for common facts: service impact, data types, geographic scope, containment, law enforcement, next update time.
- Scenario branches: Prepare variants for ransomware, suspected data exfiltration, third-party vendor breach, credential stuffing, or DDoS. Swap modules as facts change.
- Legal review triggers: Any mention of "breach," "data access," numbers of affected people, or cause should route through counsel before release.
- Plain language standard: No jargon or acronyms without context. If your support team can't read it aloud to a customer, rewrite it.
First 24-hour war room workflow
- Activate: Name an incident lead. Open a single comms channel and a single truth doc.
- Roles: Incident lead, Comms lead, Legal lead, Forensics lead, Customer support lead, Exec sponsor. One owner per role.
- Approval path: Draft → Legal → Incident lead → Exec sponsor (only when needed). Keep it fast.
- Cadence: Internal updates every 60-90 minutes. External updates every 3-4 hours or faster if impact is customer-facing.
- Decision log: Capture what was decided, why, and by whom. This protects you later.
Stakeholder map and channel plan
- Employees: What they need: what to say to customers, how to secure accounts, where to route questions. Channel: Slack/Email + FAQ.
- Customers: What they need: impact, workarounds, updates. Channel: Status page, email for impacted segments, support macros.
- Regulators: What they need: facts, timing, notifications when thresholds are met. Channel: Counsel-led filings and direct outreach.
- Vendors/Partners: What they need: dependency impact, access keys rotation, mutual incident checks. Channel: Partner portal/email.
- Board/Investors: What they need: risk, continuity, next milestones. Channel: Brief memo and scheduled calls.
FAQ and talk tracks
Stand up a living FAQ that support, sales, and executives can use. Keep answers in short, repeatable lines and tie each to a source in your truth doc.
- What happened? What do we know for sure vs. still investigating?
- What systems are affected and where?
- Was data accessed or taken? If unknown, say so and explain how you're checking.
- What should I do right now?
- When is the next update and where will it be posted?
Compliance-friendly communications
- Do not speculate. If you're estimating, label it as an estimate and date-stamp it.
- Avoid sharing indicators or tactics publicly until forensics confirms and containment is in place.
- Preserve evidence: no mass reboots or log deletions without direction from forensics.
- Use approved channels and keep drafts in your incident workspace to maintain a record.
Metrics that keep you honest
- Time to first internal and external update.
- Percentage of customer tickets responded to within SLA.
- Support backlog trend and top 5 questions.
- Status page views vs. inbound contacts (is your message reducing load?).
- Escalation triggers: if impact widens, update cadence increases automatically.
Train before it counts
Run quarterly tabletops using your actual playbook, message modules, and approval path. Pick a scenario, set clocks, and practice publishing on schedule.
- Use public guidance to shape exercises: CISA Tabletop Exercise Packages
- Align incident comms with handling process: NIST SP 800-61 (Incident Handling Guide)
Quick templates you can adapt
Employee update (Slack/Email): "We're investigating a security incident affecting [system]. We've contained the activity and are working with specialists. Please direct customer questions to [intake link]. Do not share unapproved details externally. Next update at [time]."
Customer status page: "We're investigating an incident impacting [service]. Access may be limited for some users. We've isolated the affected components and are monitoring. We'll post the next update by [time]."
Executive note to board: "At [time], we detected suspicious activity on [systems]. Containment is in place. No confirmed data access at this time; verification is underway. Customer communication is live. Next milestones: [forensics step], [notification trigger], [recovery checkpoint]."
Common mistakes to avoid
- Overpromising timelines or outcomes you can't guarantee.
- Silence that creates rumors and support overload.
- Blaming a vendor before facts are verified.
- Changing numbers across channels without explanation.
- Using technical jargon that confuses non-technical readers.
Operations takeaway
Your calm, repeatable process is the message. Set clear cadences, use message modules, route through legal, and publish on time. Do this well and you maintain trust even while the facts are still forming.
Your membership also unlocks: