Want to create interactive content? It’s easy in Genially!
TechFusion Crisis Simulation
Liz Kheng-Chindavong
Created on October 25, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
TechFusion Crisis Simulation
Let's go!
MGMT420
Tech Fusion is a global technology company specializing in developing cutting-edge software solutions. It serves millions of customers worldwide and is known for being at the forefront of innovation. However, a cyberattack has compromised the company's databases, resulting in a significant data breach affecting customer information, intellectual property, and financial data.
TechFusion Cyber Attack
Next
Date and Time: The cyberattack occurred at night and was discovered early in the morning. Impact: The breach has compromised sensitive customer and employee data, such as credit card information and social security numbers, exposing it to unauthorized individuals. Furthermore, vital intellectual property has also been stolen. Media Awareness: The media has caught wind of the breach, and the story is gaining traction rapidly. Stakeholder Concerns: Customers, investors, employees, and regulatory bodies are expressing concerns and seeking immediate actions from the company.
TechFusion Cyber Attack
Next
Next
LISTEN TO TO THE CALL
READ PROFILE
CEO - Alex Honcho
You are Alex Honcho, CEO of TechFusion, responsible for overall crisis management and decision-making. You receive a call at 3:00 in the morning alerting you to the cyber attack.
Click on an image to read their info.
YOUR SENIOR LEADERSHIP TEAM
Eric Firewall
Chief Information Officer
Sali Broadcast
Chief Communications Officer
Charlie Workflow
Chief Operations Officer
Rachael Contract
Chief Legal Counsel
Next
Assign Roles and Responsibilities
Assign clear roles and responsibilities to key team members for managing the crisis response.
It's Time To Think About Your Priorities
Issue a Statement to the Media
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Develop a Crisis Response Strategy
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Notify the Stockholders
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Eric Firewall
Chief Information Officer
David Benefits
Head of Human Resources
Daniela Calendar
Alex's Executive Assistant
Amy Buzz
Public Relations
Sali Broadcast
Chief Communications Officer
Charlie Workflow
Chief Operations Officers
Rachael Contract
Chief Legal Counsel
Jesse Networks
Director of IT
Laura Tickets
Director Customer Support
Ryan Shares
Board of Directors
Sandra Rules
Corporate Compliance Officer
Kevin Lockdown
Incident Response Team Lead
Next
It’s time to assign roles and responsibilities. Consider each person’s current role and what they should manage during the crisis by taking a brief quiz for each individual.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Issue a Statement to the Media
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Assign Roles and Responsibilities
Assign clear roles and responsibilities to key team members for managing the crisis response.
It's Time To Think About Your Priorities
Develop a Crisis Response Strategy
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Notify the Stockholders
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Play Audio
Back
In this section, take 5 to 10 minutes to draft your statement offline. Carefully craft your message, considering whether it will be a single global statement for the media, customers, stakeholders, and employees or if separate messages are needed for each audience. Think about the delivery method, the spokesperson, and the timing. Once your statement is ready, raise your hand.
DEveloping your Statement
It's time to issue a statement.
Develop a Crisis Response Strategy
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Assign Roles and Responsibilities
Assign clear roles and responsibilities to key team members for managing the crisis response.
It's Time To Think About Your Priorities
Issue a Statement to the Media
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Notify the Stockholders
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Before creating a crisis response strategy, it's essential to assess the crisis. Click on each color block to view the severity of the data breach.
Customers
1.2Million
Employees
8,500
Stockholders
1,500
Back
Develop a Crisis Response Strategy
Now that you understand the breach's impact, it's time to create your strategy. Download the template from Canvas and start filling it out in Word or Google Docs. This should take about 5-10 minutes. Once completed, submit the file in Canvas.
Assign Roles and Responsibilities
Assign clear roles and responsibilities to key team members for managing the crisis response.
It's Time To Think About Your Priorities
Issue a Statement to the Media
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Develop a Crisis Response Strategy
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Notify the Stockholders
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Next
Conference Call with the Stockholders
It’s time to address the shareholders. Click on the screen to start the conference call with the Board of Directors and listen to the update regarding the cyberattack and the company’s response strategy.
Next
24-Hours After the Attack
Your stock prices have taken a significant hit, and it’s clear that immediate action is needed. Now is the time to develop a comprehensive reputation recovery plan.
+ info
Post Crisis Plan
Your post-crisis approach includes offering two years of free credit monitoring for affected employees, customers, and stockholders, alongside immediate actions to enhance security and rebuild trust. Long-term efforts will involve ongoing monitoring, security audits, and CSR initiatives focused on data protection, ensuring TechFusion’s commitment to safeguarding data and restoring confidence in the company. Click below to hear your plan.
Play Audio >
Next
Well Done
You Have Successfully Completed The Crisis Simulation. Please ensure you have submitted your two deliverables to Canvas (Communications Statement and Crisis Response Strategy).
Rachel Contract - Chief Legal Counsel
Rachel manages all legal matters for the company, ensuring compliance with laws and regulations while protecting the company from legal risks. Her workflow involves reviewing contracts, overseeing negotiations, advising on legal strategies, and managing any litigation or disputes. She works with other departments to ensure that business decisions align with legal requirements. Rachel also stays up-to-date on legal developments and ensures that the company’s policies and procedures are in line with current laws and industry standards.
Number of impacted employees: 8,500 Types of compromised data: Personal Information: Full names, addresses, social security numbers Financial Information: Direct deposit details (bank accounts) Healthcare Information: Health insurance provider details and claims history Internal Credentials: Employee ID numbers, email addresses, internal system access credentials Sensitive Data: Payroll information, salary details, tax documents (W-2s, 1099s)
Employee Data:
Sali Broadcast - Chief Communications Officer
Sali is responsible for crafting media statements and ensuring that communication across all channels—both internal and external—remains consistent, clear, and aligned with the company's message during the crisis. She manages the flow of information to stakeholders, including the press, customers, and employees, while keeping CEO Alex Honcho updated on public perception and media developments. Sali's expertise ensures that Tech Fusion maintains control of the narrative during critical moments, preserving the company’s reputation.
Write a Reputation Mitigation Plan
Address Financial Concerns: Provide clear recovery projections and strategies to stabilize stock prices. Host investor calls or issue financial reports to demonstrate transparency and reassure stakeholders. Rebuild Customer Trust: Offer solutions like credit monitoring, refunds, or compensatory measures to affected customers. Highlight the implementation of stronger cybersecurity protocols. Ensure Transparent Communication: Issue regular press releases and hold media briefings. Maintain honest messaging about the steps being taken to fix the issue and prevent future attacks.
Eric Firewall – Chief Information Officer
Eric is an IT professional with over 20 years of experience specializing in cybersecurity, data management, and system architecture. He holds a Master’s in Information Systems Security from USC and has led global teams in securing Fortune 500 companies. As the former CTO at a major financial institution, he defended against high-profile cyberattacks, earning a reputation as a top voice in IT security. As CIO, Eric oversees the company’s IT infrastructure, focusing on cybersecurity and data protection. He leads a team to secure sensitive data and reports directly to CEO Alex Honcho, serving as her key advisor on technological matters.
Alex Honcho
Chief Executive Officer
Professional Background: Senior Software Engineer – QuantumTech (5 years): Began career at a Silicon Valley startup, focusing on AI and cybersecurity advancements. Director of Cybersecurity – Orbital Networks (3 years): Led cybersecurity efforts at a global cloud infrastructure company. Vice President of Global Operations – ByteSpace (4 years): Managed global teams and expanded operations into Asia and South America. Education: Bachelor’s in Computer Science – Stanford University MBA – Harvard Business School
Charlie Workflow - Chief Operations Officer
Charlie oversees the company's daily operations, ensuring everything runs smoothly and efficiently. His workflow involves coordinating with department heads, streamlining processes, managing resources, and ensuring that projects stay on schedule and within budget. Charlie constantly monitors performance metrics, solves operational challenges, and implements strategies to improve productivity. He plays a key role in aligning the company's operations with its overall goals and objectives.
Number of impacted stockholders: 15,000 Types of compromised data: Personal Information: Full names, contact information, stock purchase history Financial Information: Bank account details for dividend distributions Stockholder IDs: Unique stockholder ID numbers and shareholdings data Voting Records: Historical voting information from shareholder meetings Institutional Investors Impact: 5 major investment firms with access to confidential stockholder data
Stockholder Data:
Number of impacted customers: 1.2 million Types of compromised data: Personal Information: Full names, addresses, email addresses, phone numbers Financial Information: Credit card numbers (with expiration dates and CVVs), bank account details Account Information: Usernames, hashed passwords, purchase history Sensitive Data: Social Security Numbers (for 250,000 U.S. customers) Geographical Spread: Customers affected across North America (60%), Europe (25%), and Asia (15%)