1. Purpose of this Guide
This artefact demonstrates that your company has a plan for who communicates what, when, and to whom during a cyber incident. Cyber Essentials requires this because confusion and silence during a crisis cause as much damage as the incident itself. A documented timeline and comms plan ensures staff, management, regulators, and customers get the right message at the right time.
2. What You Will Submit
You will need:
-
A Crisis Communications and Timeline document (Word, PDF, or spreadsheet).
-
It should include:
-
Key contacts (Incident Lead, Comms Lead, CEO, Legal, IT).
-
Communication channels (email, phone, Teams/Slack, press release).
-
Escalation steps (who is told first, who is told next).
-
Incident timeline template (time of detection, first comms, regulator notification, customer updates).
-
3. How to Collect / Obtain / Generate This Evidence
-
If starting from scratch:
-
Use StrongKeep's Crisis Communications Template (in the Incident Response Plan).
-
Fill in:
-
Roles: e.g. CEO (public spokesperson), Comms Lead (drafts announcements), IT Manager (technical updates), Secretary (logs comms).
-
Timeline markers: Detection → Internal staff alert → Executive team alert → Regulator notified → Customer notification → Post-incident briefing.
-
Message library: Draft templates for “Initial Detection,” “Containment in Progress,” “Resolution,” and “Follow-up.”
-
-
Save the file with version history and circulate to management.
-
-
If you already have an existing Incident Response Plan (IRP):
-
Extract or reference the communications and timeline section into a standalone document.
-
Ensure roles and contacts are current.
-
4. Evidence Format
-
Accepted file types: DOCX, PDF, XLSX.
-
Suggested naming format:
YourCompanyName_CrisisCommsTimeline_YYYY-MM-DD.pdf
5. What “Good” Looks Like
-
Clear roles and responsibilities (no confusion about who speaks).
-
Defined timeline with escalation points.
-
Message templates prepared in advance (not written in panic).
-
Version control showing the plan is updated regularly.
Why it matters: auditors want to see that communication is not improvised but structured, fast, and compliant with notification obligations.
6. Tips
-
Review at least annually and after real incidents.
-
Test it in tabletop exercises with your Cyber Incident Response Plan.
-
Keep regulator and customer comms separate — audiences need different levels of detail.