Want to create interactive content? It’s easy in Genially!

Get started free

TechFusion Crisis Simulation

Liz Kheng-Chindavong

Created on October 25, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Mobile App Dossier

Color Shapes Dossier

Notes Dossier

Futuristic Tech Dossier

Crowdfunding Campaign

Company Dossier

Economy Dossier

Transcript

TechFusion Crisis Simulation

MGMT420

Let's go!

TechFusion Cyber Attack

Tech Fusion is a global technology company specializing in developing cutting-edge software solutions. It serves millions of customers worldwide and is known for being at the forefront of innovation. However, a cyberattack has compromised the company's databases, resulting in a significant data breach affecting customer information, intellectual property, and financial data.

Next

TechFusion Cyber Attack

Date and Time: The cyberattack occurred at night and was discovered early in the morning. Impact: The breach has compromised sensitive customer and employee data, such as credit card information and social security numbers, exposing it to unauthorized individuals. Furthermore, vital intellectual property has also been stolen. Media Awareness: The media has caught wind of the breach, and the story is gaining traction rapidly. Stakeholder Concerns: Customers, investors, employees, and regulatory bodies are expressing concerns and seeking immediate actions from the company.

Next

CEO - Alex Honcho

You are Alex Honcho, CEO of TechFusion, responsible for overall crisis management and decision-making. You receive a call at 3:00 in the morning alerting you to the cyber attack.

READ PROFILE
LISTEN TO TO THE CALL

Next

YOUR SENIOR LEADERSHIP TEAM

Click on an image to read their info.

Sali Broadcast

Rachael Contract

Charlie Workflow

Eric Firewall

Chief Legal Counsel

Chief Operations Officer

Chief Communications Officer

Chief Information Officer

Next

It's Time To Think About Your Priorities

Assign Roles and Responsibilities

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Issue a Statement to the Media

Assign clear roles and responsibilities to key team members for managing the crisis response.

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Develop a Crisis Response Strategy

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Notify the Stockholders

Laura Tickets

Sali Broadcast

Eric Firewall

Director Customer Support
Chief Communications Officer
Chief Information Officer

Ryan Shares

Charlie Workflow

David Benefits

Board of Directors
Chief Operations Officers
Head of Human Resources

Sandra Rules

Rachael Contract

Daniela Calendar

Corporate Compliance Officer
Chief Legal Counsel
Alex's Executive Assistant

Kevin Lockdown

Jesse Networks

Amy Buzz

Incident Response Team Lead
Director of IT
Public Relations
It’s time to assign roles and responsibilities. Consider each person’s current role and what they should manage during the crisis by taking a brief quiz for each individual.

Next

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

Next

Let’s begin by assigning responsibilities as the cornerstone of your crisis strategy.

It's Time To Think About Your Priorities

Assign Roles and Responsibilities

Issue a Statement to the Media

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Assign clear roles and responsibilities to key team members for managing the crisis response.

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Develop a Crisis Response Strategy

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Notify the Stockholders

DEveloping your Statement

In this section, take 5 to 10 minutes to draft your statement offline. Carefully craft your message, considering whether it will be a single global statement for the media, customers, stakeholders, and employees or if separate messages are needed for each audience. Think about the delivery method, the spokesperson, and the timing. Submit your statement to Canvas.

Play Audio
It's time to issue a statement.

Back

It's Time To Think About Your Priorities

Assign Roles and Responsibilities

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Issue a Statement to the Media

Assign clear roles and responsibilities to key team members for managing the crisis response.

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Notify the Stockholders

Develop a Crisis Response Strategy

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Develop a Crisis Response Strategy

Before creating a crisis response strategy, it's essential to assess the crisis. Click on each color block to view the severity of the data breach.

1,500

Stockholders

1.2Million

Customers

8,500

Employees

Now that you understand the breach's impact, it's time to create your strategy. Download the template from Canvas and start filling it out in Word or Google Docs. This should take about 5-10 minutes. Once completed, submit the file in Canvas.

Back

It's Time To Think About Your Priorities

Assign Roles and Responsibilities

Issue a clear and concise statement to the media acknowledging the cyberattack and outlining the immediate actions being taken to address the breach and protect customer data.

Issue a Statement to the Media

Assign clear roles and responsibilities to key team members for managing the crisis response.

Develop a comprehensive crisis response strategy to contain the breach, communicate effectively, and mitigate further risks.

Develop a Crisis Response Strategy

Notify stockholders promptly about the cyberattack and the actions being taken to manage the situation.

Notify the Stockholders

Conference Call with the Stockholders

It’s time to address the shareholders. Click on the screen to start the conference call with the Board of Directors and listen to the update regarding the cyberattack and the company’s response strategy.

Next

24-Hours After the Attack

Your stock prices have taken a significant hit, and it’s clear that immediate action is needed. Now is the time to develop a comprehensive reputation recovery plan.

+ info

Next

Post Crisis Plan

Your post-crisis approach includes offering two years of free credit monitoring for affected employees, customers, and stockholders, alongside immediate actions to enhance security and rebuild trust. Long-term efforts will involve ongoing monitoring, security audits, and CSR initiatives focused on data protection, ensuring TechFusion’s commitment to safeguarding data and restoring confidence in the company. Click below to hear your plan.

Play Audio >

Next

Well Done

You Have Successfully Completed The Crisis Simulation. Please ensure you have submitted your two deliverables to Canvas (Communications Statement and Crisis Response Strategy).
Rachel Contract - Chief Legal Counsel

Rachel manages all legal matters for the company, ensuring compliance with laws and regulations while protecting the company from legal risks. Her workflow involves reviewing contracts, overseeing negotiations, advising on legal strategies, and managing any litigation or disputes. She works with other departments to ensure that business decisions align with legal requirements. Rachel also stays up-to-date on legal developments and ensures that the company’s policies and procedures are in line with current laws and industry standards.

Employee Data:

Number of impacted employees: 8,500 Types of compromised data: Personal Information: Full names, addresses, social security numbers Financial Information: Direct deposit details (bank accounts) Healthcare Information: Health insurance provider details and claims history Internal Credentials: Employee ID numbers, email addresses, internal system access credentials Sensitive Data: Payroll information, salary details, tax documents (W-2s, 1099s)

Sali Broadcast - Chief Communications Officer

Sali is responsible for crafting media statements and ensuring that communication across all channels—both internal and external—remains consistent, clear, and aligned with the company's message during the crisis. She manages the flow of information to stakeholders, including the press, customers, and employees, while keeping CEO Alex Honcho updated on public perception and media developments. Sali's expertise ensures that Tech Fusion maintains control of the narrative during critical moments, preserving the company’s reputation.

Write a Reputation Mitigation Plan

Address Financial Concerns: Provide clear recovery projections and strategies to stabilize stock prices. Host investor calls or issue financial reports to demonstrate transparency and reassure stakeholders. Rebuild Customer Trust: Offer solutions like credit monitoring, refunds, or compensatory measures to affected customers. Highlight the implementation of stronger cybersecurity protocols. Ensure Transparent Communication: Issue regular press releases and hold media briefings. Maintain honest messaging about the steps being taken to fix the issue and prevent future attacks.

Eric Firewall – Chief Information Officer

Eric is an IT professional with over 20 years of experience specializing in cybersecurity, data management, and system architecture. He holds a Master’s in Information Systems Security from USC and has led global teams in securing Fortune 500 companies. As the former CTO at a major financial institution, he defended against high-profile cyberattacks, earning a reputation as a top voice in IT security. As CIO, Eric oversees the company’s IT infrastructure, focusing on cybersecurity and data protection. He leads a team to secure sensitive data and reports directly to CEO Alex Honcho, serving as her key advisor on technological matters.

Alex Honcho

Chief Executive Officer

Professional Background: Senior Software Engineer – QuantumTech (5 years): Began career at a Silicon Valley startup, focusing on AI and cybersecurity advancements. Director of Cybersecurity – Orbital Networks (3 years): Led cybersecurity efforts at a global cloud infrastructure company. Vice President of Global Operations – ByteSpace (4 years): Managed global teams and expanded operations into Asia and South America. Education: Bachelor’s in Computer Science – Stanford University MBA – Harvard Business School

Charlie Workflow - Chief Operations Officer

Charlie oversees the company's daily operations, ensuring everything runs smoothly and efficiently. His workflow involves coordinating with department heads, streamlining processes, managing resources, and ensuring that projects stay on schedule and within budget. Charlie constantly monitors performance metrics, solves operational challenges, and implements strategies to improve productivity. He plays a key role in aligning the company's operations with its overall goals and objectives.

Stockholder Data:

Number of impacted stockholders: 15,000 Types of compromised data: Personal Information: Full names, contact information, stock purchase history Financial Information: Bank account details for dividend distributions Stockholder IDs: Unique stockholder ID numbers and shareholdings data Voting Records: Historical voting information from shareholder meetings Institutional Investors Impact: 5 major investment firms with access to confidential stockholder data

Customer Data:

Number of impacted customers: 1.2 million Types of compromised data: Personal Information: Full names, addresses, email addresses, phone numbers Financial Information: Credit card numbers (with expiration dates and CVVs), bank account details Account Information: Usernames, hashed passwords, purchase history Sensitive Data: Social Security Numbers (for 250,000 U.S. customers) Geographical Spread: Customers affected across North America (60%), Europe (25%), and Asia (15%)