Crisis Meeting Agenda
A simple crisis meeting agenda to help leaders and companies quickly address an issue, mitigate damages and move forward with a solution.
Template
**Date:** August 22, 2025 **Time:** 12:30 PM **Location/Platform:** Google Meet **Attendees:** CEO, CTO, Head of Security, PR Executive, Legal Counsel, Operations Manager, HR Lead --- ### **Introduction and Purpose** (5 mins) - **Goal:** Address the recent data breach at GazeBook Inc. and develop a cohesive plan to contain the damage, mitigate more risks, and recovery plans. - **Word from the CEO:** Acknowledge the gravity of the crisis and emphasize the importance of collaboration and diligence in managing the problem. --- ### **Crisis Summary** (10 mins) - **Incident Overview:** - A data breach occurred on October 22, 2023, at 2:00 PM, compromising the personal data of approximately 450,100 users, including user ids, emails, passwords, and payment information. - The breach was discovered by Richard Simmons of the IT security team during an audit. - The attacker(s) exploited a vulnerability in the company’s payment and retargeting systems, which we have since identified and patched. - **Current Status:** - The vulnerability has been handled, and all unauthorized accessors were blocked. - We are running an investigation to ensure all bases are covered. --- ### **Impact Assessment** (10 mins) - **Operations:** - Delayed orders and services to the payment gateway disruption. - External client services are the most affected. - **Customers:** - Potential backlash or churn over compromised data. - Huge list of inquires to the support team. - **Employees:** - Concerns on their own data and job security. - **Reputation:** - Twitter handle has been receiving a lot of negative feedback, and questioning our ability to safeguard proprietary data. - Print and digital media have picked up the story. - **Financials:** - $3.5 million projected to be our loss for service disruption and user churn. --- ### **Crisis Response Actions** (15 mins) - **Actions Taken:** - Vulnerability identified and patched. - Breached data sets and systems were isolated. - For all compromised account, two-factor authentication is set and password changed. - Third-party team assisting to determine breach’s origin and scope. - **External Communications:** - Preliminary email has been sent to affected users, directing them to safeguard their account. - Social posts assuring users that the issue has been handled. - **Effectiveness:** - Containment was successful but lack of details updates is a cause of concern for the users. - **Gaps:** - Concerns on providing prompt communication to affected users. --- ### **Risk and Escalation Management** (10 mins) - **Key Risks:** - If media narrative escalates, could damage reputation. - Potential legal action and fines possible. - Risk of secondary attacks in case of password reusage. - **Escalation Points:** - GDPR fines could be significant, so monitor diligently. - Escalate if partners or institutional client disengage. - **Risk Management Protocols:** - Legal and compliance are interfacing with regulatory bodies - Insurance vendors have been notified. --- ### **Action Plan Development** (15 mins) - **Immediate Actions:** - Do a thorough forensic investigation and get expert opinion. - Issue a detailed, transparent report to customers along with mitigation plan. - Offer free monitoring service for affected users. - **Responsible Parties:** - CISO will oversee investigation along with CTO and external experts. - PR Manager & Marketing Head will work on media inquiries. - Potential regulatory issues and liability report will be presented by the legal counsel. - **Timelines:** - Complete forensic investigation report to be ready in 72 hours - Communication to users will be done in 48 hours. - Third-party security experts will be hired within 4 working days. - **Resource Allocation:** - Provide extra support to staff handling customer inquiries. - Improve cybersecurity resources for regular monitoring. --- ### **Communication Strategy** (15 mins) - **Internal Communication:** - Employees will be informed about the crisis and our response during the all-hands meeting in the evening. - Emotional support and resources for employees on data protection will be provided by the HR department. - **External Communication:** - The nature of the breach and mitigation steps will be shared at the end of the day via press release. - PR Manager Sarah Tiana will handle all interviews with media and influencers. - Social media department will work three 8-hour shifts on rotation to answer user queries. - **Consistency:** - Ensure alignment with company values like transparency and responsibility on all official communication channels including social. --- ### **Next Steps and Follow-up** (4 mins) **Next Meeting:** - There will be another meeting held on November 11 to track progress on the investigation and a post-mortem report will be furnished by the cyber security team. **Follow-up:** - We will diligently track all the tasks and assigned stakeholders and regularly update the leadership. - Any changes to the plan will need permission from the leadership team and the security officer. --- ### **Conclusion** (5 mins) **Decisions Made:** - Crisis is contained but further investigations are still happening. - Robust communication strategy with users and media will be implemented. - Expand support for affected users. - Create special team to support institutional users from Fortune 500 list. **Thoughts from the CEO:** Duly acknowledge the team’s swift response and emphasize the need for a collaborative approach for managing the crisis. --- ### Key Contacts - **CEO:** Bill Smith - **CTO:** Mary Joe - **CISO:** Benjamin Lee - **PR Manager:** Sarah Tianna - **Legal Counsel:** Ben Thompson