Want to create interactive content? It’s easy in Genially!
TechFusion Crisis Simulation
Liz Kheng-Chindavong
Created on October 25, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Mobile App Dossier
View
Color Shapes Dossier
View
Notes Dossier
View
Futuristic Tech Dossier
View
Crowdfunding Campaign
View
Company Dossier
View
Economy Dossier
Transcript
TechFusion Crisis Simulation
MGMT420
Let's go!
TechFusion Cyber Attack
Tech Fusion is a global technology company specializing in developing cutting-edge software solutions. It serves millions of customers worldwide and is known for being at the forefront of innovation. However, a cyberattack has compromised the company's databases, resulting in a significant data breach affecting customer information, intellectual property, and financial data.
Next
TechFusion Cyber Attack
Date and Time: The cyberattack occurred at night and was discovered early in the morning. Impact: The breach has compromised sensitive customer and employee data, such as credit card information and social security numbers, exposing it to unauthorized individuals. Furthermore, vital intellectual property has also been stolen. Media Awareness: The media has caught wind of the breach, and the story is gaining traction rapidly. Stakeholder Concerns: Customers, investors, employees, and regulatory bodies are expressing concerns and seeking immediate actions from the company.
Next
CEO - Alex Honcho
You are Alex Honcho, CEO of TechFusion, responsible for overall crisis management and decision-making. You receive a call at 3:00 in the morning alerting you to the cyber attack.
READ PROFILE
LISTEN TO TO THE CALL
Next
YOUR SENIOR LEADERSHIP TEAM
Click on an image to read their info.
Sali Broadcast
Rachael Contract
Charlie Workflow
Eric Firewall
Chief Legal Counsel
Chief Operations Officer
Chief Communications Officer
Chief Information Officer
Next
It's Time To Think About Your Priorities
Assign Roles and Responsibilities
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Issue a Statement to the Media
Assign clear roles and responsibilities to key team members for managing the crisis response.
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Develop a Crisis Response Strategy
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Notify the Stockholders
Laura Tickets
Sali Broadcast
Eric Firewall
Director Customer Support
Chief Communications Officer
Chief Information Officer
Ryan Shares
Charlie Workflow
David Benefits
Board of Directors
Chief Operations Officers
Head of Human Resources
Sandra Rules
Rachael Contract
Daniela Calendar
Corporate Compliance Officer
Chief Legal Counsel
Alex's Executive Assistant
Kevin Lockdown
Jesse Networks
Amy Buzz
Incident Response Team Lead
Director of IT
Public Relations
It’s time to assign roles and responsibilities. Consider each person’s current role and what they should manage during the crisis by taking a brief quiz for each individual.
Next
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
Next
Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.
It's Time To Think About Your Priorities
Assign Roles and Responsibilities
Issue a Statement to the Media
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Assign clear roles and responsibilities to key team members for managing the crisis response.
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Develop a Crisis Response Strategy
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Notify the Stockholders
DEveloping your Statement
In this section, take 5 to 10 minutes to draft your statement offline. Carefully craft your message, considering whether it will be a single global statement for the media, customers, stakeholders, and employees or if separate messages are needed for each audience. Think about the delivery method, the spokesperson, and the timing. Submit your statement to Canvas.
Play Audio
It's time to issue a statement.
Back
It's Time To Think About Your Priorities
Assign Roles and Responsibilities
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Issue a Statement to the Media
Assign clear roles and responsibilities to key team members for managing the crisis response.
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Notify the Stockholders
Develop a Crisis Response Strategy
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Develop a Crisis Response Strategy
Before creating a crisis response strategy, it's essential to assess the crisis. Click on each color block to view the severity of the data breach.
1,500
Stockholders
1.2Million
Customers
8,500
Employees
Now that you understand the breach's impact, it's time to create your strategy. Download the template from Canvas and start filling it out in Word or Google Docs. This should take about 5-10 minutes. Once completed, submit the file in Canvas.
Back
It's Time To Think About Your Priorities
Assign Roles and Responsibilities
Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.
Issue a Statement to the Media
Assign clear roles and responsibilities to key team members for managing the crisis response.
Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.
Develop a Crisis Response Strategy
Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.
Notify the Stockholders
Conference Call with the Stockholders
It’s time to address the shareholders. Click on the screen to start the conference call with the Board of Directors and listen to the update regarding the cyberattack and the company’s response strategy.
Next
24-Hours After the Attack
Your stock prices have taken a significant hit, and it’s clear that immediate action is needed. Now is the time to develop a comprehensive reputation recovery plan.
+ info
Next
Post Crisis Plan
Your post-crisis approach includes offering two years of free credit monitoring for affected employees, customers, and stockholders, alongside immediate actions to enhance security and rebuild trust. Long-term efforts will involve ongoing monitoring, security audits, and CSR initiatives focused on data protection, ensuring TechFusion’s commitment to safeguarding data and restoring confidence in the company. Click below to hear your plan.
Play Audio >
Next
Well Done
You Have Successfully Completed The Crisis Simulation. Please ensure you have submitted your two deliverables to Canvas (Communications Statement and Crisis Response Strategy).
Rachel Contract - Chief Legal Counsel
Rachel manages all legal matters for the company, ensuring compliance with laws and regulations while protecting the company from legal risks. Her workflow involves reviewing contracts, overseeing negotiations, advising on legal strategies, and managing any litigation or disputes. She works with other departments to ensure that business decisions align with legal requirements. Rachel also stays up-to-date on legal developments and ensures that the company’s policies and procedures are in line with current laws and industry standards.
Employee Data:
Number of impacted employees: 8,500 Types of compromised data: Personal Information: Full names, addresses, social security numbers Financial Information: Direct deposit details (bank accounts) Healthcare Information: Health insurance provider details and claims history Internal Credentials: Employee ID numbers, email addresses, internal system access credentials Sensitive Data: Payroll information, salary details, tax documents (W-2s, 1099s)
Sali Broadcast - Chief Communications Officer
Sali is responsible for crafting media statements and ensuring that communication across all channels—both internal and external—remains consistent, clear, and aligned with the company's message during the crisis. She manages the flow of information to stakeholders, including the press, customers, and employees, while keeping CEO Alex Honcho updated on public perception and media developments. Sali's expertise ensures that Tech Fusion maintains control of the narrative during critical moments, preserving the company’s reputation.
Write a Reputation Mitigation Plan
Address Financial Concerns: Provide clear recovery projections and strategies to stabilize stock prices. Host investor calls or issue financial reports to demonstrate transparency and reassure stakeholders. Rebuild Customer Trust: Offer solutions like credit monitoring, refunds, or compensatory measures to affected customers. Highlight the implementation of stronger cybersecurity protocols. Ensure Transparent Communication: Issue regular press releases and hold media briefings. Maintain honest messaging about the steps being taken to fix the issue and prevent future attacks.
Eric Firewall – Chief Information Officer
Eric is an IT professional with over 20 years of experience specializing in cybersecurity, data management, and system architecture. He holds a Master’s in Information Systems Security from USC and has led global teams in securing Fortune 500 companies. As the former CTO at a major financial institution, he defended against high-profile cyberattacks, earning a reputation as a top voice in IT security. As CIO, Eric oversees the company’s IT infrastructure, focusing on cybersecurity and data protection. He leads a team to secure sensitive data and reports directly to CEO Alex Honcho, serving as her key advisor on technological matters.
Alex Honcho
Chief Executive Officer
Professional Background: Senior Software Engineer – QuantumTech (5 years): Began career at a Silicon Valley startup, focusing on AI and cybersecurity advancements. Director of Cybersecurity – Orbital Networks (3 years): Led cybersecurity efforts at a global cloud infrastructure company. Vice President of Global Operations – ByteSpace (4 years): Managed global teams and expanded operations into Asia and South America. Education: Bachelor’s in Computer Science – Stanford University MBA – Harvard Business School
Charlie Workflow - Chief Operations Officer
Charlie oversees the company's daily operations, ensuring everything runs smoothly and efficiently. His workflow involves coordinating with department heads, streamlining processes, managing resources, and ensuring that projects stay on schedule and within budget. Charlie constantly monitors performance metrics, solves operational challenges, and implements strategies to improve productivity. He plays a key role in aligning the company's operations with its overall goals and objectives.
Stockholder Data:
Number of impacted stockholders: 15,000 Types of compromised data: Personal Information: Full names, contact information, stock purchase history Financial Information: Bank account details for dividend distributions Stockholder IDs: Unique stockholder ID numbers and shareholdings data Voting Records: Historical voting information from shareholder meetings Institutional Investors Impact: 5 major investment firms with access to confidential stockholder data
Customer Data:
Number of impacted customers: 1.2 million Types of compromised data: Personal Information: Full names, addresses, email addresses, phone numbers Financial Information: Credit card numbers (with expiration dates and CVVs), bank account details Account Information: Usernames, hashed passwords, purchase history Sensitive Data: Social Security Numbers (for 250,000 U.S. customers) Geographical Spread: Customers affected across North America (60%), Europe (25%), and Asia (15%)