Want to create interactive content? It’s easy in Genially!

Get started free

TechFusion Crisis Simulation

Liz Kheng-Chindavong

Created on October 25, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

TechFusion Crisis Simulation

Let's go!

MGMT420

Tech Fusion is a global technology company specializing in developing cutting-edge software solutions. It serves millions of customers worldwide and is known for being at the forefront of innovation. However, a cyberattack has compromised the company's databases, resulting in a significant data breach affecting customer information, intellectual property, and financial data.

TechFusion Cyber Attack

Next

Date and Time: The cyberattack occurred at night and was discovered early in the morning. Impact: The breach has compromised sensitive customer and employee data, such as credit card information and social security numbers, exposing it to unauthorized individuals. Furthermore, vital intellectual property has also been stolen. Media Awareness: The media has caught wind of the breach, and the story is gaining traction rapidly. Stakeholder Concerns: Customers, investors, employees, and regulatory bodies are expressing concerns and seeking immediate actions from the company.

TechFusion Cyber Attack

Next

Next

LISTEN TO TO THE CALL
READ PROFILE

CEO - Alex Honcho

You are Alex Honcho, CEO of TechFusion, responsible for overall crisis management and decision-making. You receive a call at 3:00 in the morning alerting you to the cyber attack.

Click on an image to read their info.

YOUR SENIOR LEADERSHIP TEAM

Eric Firewall

Chief Information Officer

Sali Broadcast

Chief Communications Officer

Charlie Workflow

Chief Operations Officer

Rachael Contract

Chief Legal Counsel

Next

Assign Roles and Responsibilities

Assign clear roles and responsibilities to key team members for managing the crisis response.

It's Time To Think About Your Priorities

Issue a Statement to the Media

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Develop a Crisis Response Strategy

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Notify the Stockholders

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Eric Firewall

Chief Information Officer

David Benefits

Head of Human Resources

Daniela Calendar

Alex's Executive Assistant

Amy Buzz

Public Relations

Sali Broadcast

Chief Communications Officer

Charlie Workflow

Chief Operations Officers

Rachael Contract

Chief Legal Counsel

Jesse Networks

Director of IT

Laura Tickets

Director Customer Support

Ryan Shares

Board of Directors

Sandra Rules

Corporate Compliance Officer

Kevin Lockdown

Incident Response Team Lead

Next

It’s time to assign roles and responsibilities. Consider each person’s current role and what they should manage during the crisis by taking a brief quiz for each individual.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Issue a Statement to the Media

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Assign Roles and Responsibilities

Assign clear roles and responsibilities to key team members for managing the crisis response.

It's Time To Think About Your Priorities

Develop a Crisis Response Strategy

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Notify the Stockholders

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Play Audio

Back

In this section, take 5 to 10 minutes to draft your statement offline. Carefully craft your message, considering whether it will be a single global statement for the media, customers, stakeholders, and employees or if separate messages are needed for each audience. Think about the delivery method, the spokesperson, and the timing. Once your statement is ready, raise your hand.

DEveloping your Statement
It's time to issue a statement.

Develop a Crisis Response Strategy

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Assign Roles and Responsibilities

Assign clear roles and responsibilities to key team members for managing the crisis response.

It's Time To Think About Your Priorities

Issue a Statement to the Media

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Notify the Stockholders

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Before creating a crisis response strategy, it's essential to assess the crisis. Click on each color block to view the severity of the data breach.

Customers

1.2Million

Employees

8,500

Stockholders

1,500

Back

Develop a Crisis Response Strategy

Now that you understand the breach's impact, it's time to create your strategy. Download the template from Canvas and start filling it out in Word or Google Docs. This should take about 5-10 minutes. Once completed, submit the file in Canvas.

Assign Roles and Responsibilities

Assign clear roles and responsibilities to key team members for managing the crisis response.

It's Time To Think About Your Priorities

Issue a Statement to the Media

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Develop a Crisis Response Strategy

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Notify the Stockholders

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Next

Conference Call with the Stockholders

It’s time to address the shareholders. Click on the screen to start the conference call with the Board of Directors and listen to the update regarding the cyberattack and the company’s response strategy.

Next

24-Hours After the Attack

Your stock prices have taken a significant hit, and it’s clear that immediate action is needed. Now is the time to develop a comprehensive reputation recovery plan.

+ info

Post Crisis Plan

Your post-crisis approach includes offering two years of free credit monitoring for affected employees, customers, and stockholders, alongside immediate actions to enhance security and rebuild trust. Long-term efforts will involve ongoing monitoring, security audits, and CSR initiatives focused on data protection, ensuring TechFusion’s commitment to safeguarding data and restoring confidence in the company. Click below to hear your plan.

Play Audio >

Next

Well Done

You Have Successfully Completed The Crisis Simulation. Please ensure you have submitted your two deliverables to Canvas (Communications Statement and Crisis Response Strategy).
Rachel Contract - Chief Legal Counsel

Rachel manages all legal matters for the company, ensuring compliance with laws and regulations while protecting the company from legal risks. Her workflow involves reviewing contracts, overseeing negotiations, advising on legal strategies, and managing any litigation or disputes. She works with other departments to ensure that business decisions align with legal requirements. Rachel also stays up-to-date on legal developments and ensures that the company’s policies and procedures are in line with current laws and industry standards.

Number of impacted employees: 8,500 Types of compromised data: Personal Information: Full names, addresses, social security numbers Financial Information: Direct deposit details (bank accounts) Healthcare Information: Health insurance provider details and claims history Internal Credentials: Employee ID numbers, email addresses, internal system access credentials Sensitive Data: Payroll information, salary details, tax documents (W-2s, 1099s)

Employee Data:

Sali Broadcast - Chief Communications Officer

Sali is responsible for crafting media statements and ensuring that communication across all channels—both internal and external—remains consistent, clear, and aligned with the company's message during the crisis. She manages the flow of information to stakeholders, including the press, customers, and employees, while keeping CEO Alex Honcho updated on public perception and media developments. Sali's expertise ensures that Tech Fusion maintains control of the narrative during critical moments, preserving the company’s reputation.

Write a Reputation Mitigation Plan

Address Financial Concerns: Provide clear recovery projections and strategies to stabilize stock prices. Host investor calls or issue financial reports to demonstrate transparency and reassure stakeholders. Rebuild Customer Trust: Offer solutions like credit monitoring, refunds, or compensatory measures to affected customers. Highlight the implementation of stronger cybersecurity protocols. Ensure Transparent Communication: Issue regular press releases and hold media briefings. Maintain honest messaging about the steps being taken to fix the issue and prevent future attacks.

Eric Firewall – Chief Information Officer

Eric is an IT professional with over 20 years of experience specializing in cybersecurity, data management, and system architecture. He holds a Master’s in Information Systems Security from USC and has led global teams in securing Fortune 500 companies. As the former CTO at a major financial institution, he defended against high-profile cyberattacks, earning a reputation as a top voice in IT security. As CIO, Eric oversees the company’s IT infrastructure, focusing on cybersecurity and data protection. He leads a team to secure sensitive data and reports directly to CEO Alex Honcho, serving as her key advisor on technological matters.

Alex Honcho

Chief Executive Officer

Professional Background: Senior Software Engineer – QuantumTech (5 years): Began career at a Silicon Valley startup, focusing on AI and cybersecurity advancements. Director of Cybersecurity – Orbital Networks (3 years): Led cybersecurity efforts at a global cloud infrastructure company. Vice President of Global Operations – ByteSpace (4 years): Managed global teams and expanded operations into Asia and South America. Education: Bachelor’s in Computer Science – Stanford University MBA – Harvard Business School

Charlie Workflow - Chief Operations Officer

Charlie oversees the company's daily operations, ensuring everything runs smoothly and efficiently. His workflow involves coordinating with department heads, streamlining processes, managing resources, and ensuring that projects stay on schedule and within budget. Charlie constantly monitors performance metrics, solves operational challenges, and implements strategies to improve productivity. He plays a key role in aligning the company's operations with its overall goals and objectives.

Number of impacted stockholders: 15,000 Types of compromised data: Personal Information: Full names, contact information, stock purchase history Financial Information: Bank account details for dividend distributions Stockholder IDs: Unique stockholder ID numbers and shareholdings data Voting Records: Historical voting information from shareholder meetings Institutional Investors Impact: 5 major investment firms with access to confidential stockholder data

Stockholder Data:

Number of impacted customers: 1.2 million Types of compromised data: Personal Information: Full names, addresses, email addresses, phone numbers Financial Information: Credit card numbers (with expiration dates and CVVs), bank account details Account Information: Usernames, hashed passwords, purchase history Sensitive Data: Social Security Numbers (for 250,000 U.S. customers) Geographical Spread: Customers affected across North America (60%), Europe (25%), and Asia (15%)

Customer Data: