A Breach in the Building
A hands-on case study — respond to a live security incident step by step using Cyberday's incident management workflow.
Before you start — Create your Cyberday account
This module uses a live Cyberday workspace embedded on the right side of your screen. The signup page cannot be embedded, so you need to create your account in a separate tab first. Once signed in there, the embedded panel in this module will work automatically.
- Click the button below — it opens app.cyberday.ai in a new tab.
- Choose "Sign up" and register with your email.
- Complete the email verification and finish the short signup form.
- Leave that tab signed in, then return here.
What Happened
"We've got a problem. One of the sales team received an email that looked like it was from us — IT support — asking them to verify their login details. They clicked the link and entered their credentials. About two hours later our monitoring flagged login activity from an IP address in a country we don't operate in."
"The employee has already reported it through the Guidebook. It's sitting in your Security Incidents list right now. The account has been suspended but we don't know yet what the attacker accessed. You need to work through this."
Submitted via: Cyberday Guidebook — Report an incident
Time: Tuesday 08:47
I received an email yesterday afternoon that appeared to be from IT support asking me to verify my account. The email looked legitimate — it had the company logo and formatting I recognised. I clicked the link and entered my username and password.
This morning Jarkko told me there was unusual login activity on my account overnight. I think my credentials may have been stolen. I am really sorry — I did not realise it was fake at the time.
Sales Team, NordChem Oy
How Incident Management Works in Cyberday
What is Incident Management?
Incident management is a structured approach to detecting, responding to, and resolving security incidents. The goal is to minimise the impact of an incident — containing it quickly, restoring normal operations, and making sure it doesn't happen again.
Without a structured process, organisations respond in a panic — steps get missed, evidence gets lost, and the same incident can happen again. Cyberday's workflow guides you through every stage so nothing falls through the cracks.
The Five-Stage Incident Workflow
Every incident in Cyberday moves through five stages. Each stage must be completed and marked as done before the incident progresses to the next one.
| Stage | What happens |
|---|---|
| Detection | The incident is reported and the owner is notified. The incident appears in the Security Incidents list. |
| Described | The admin accepts the incident, fills in what happened, sets the owner and priority, and marks section 01 complete. |
| Effects | The impact is assessed — how critical was it, was data accessed, how urgent is the fix. Section 02 is marked complete. |
| Improvements | Actions are planned to prevent recurrence. Response steps are documented. Section 03 and 04 are completed. |
| Closed | All measures are reviewed and implemented. The incident is marked as closed. |
Where to Find Incidents in Cyberday
Go to Organisation Dashboard → Incident Management theme → Documentation → Security Incidents. This is where all reported incidents appear. At the top of the list you can filter by workflow stage to see what needs attention.
When an incident is reported by an employee through the Guidebook, the admin assigned to incident management receives an immediate notification — by email, or via Teams or Slack if those integrations are active.
Describe the Incident
-
Go to Organisation Dashboard → Incident Management theme → Documentation → Security Incidents.You will see Laura's report listed at the Detection stage. Use the filter at the top to confirm you are looking at the right stage.
-
Click on the incident to open it. Click Accept to confirm this is a real incident and begin treatment.Until you accept the incident, you cannot begin filling in details or moving it through the workflow.
-
Fill in the details under "01 What was the type of incident". Based on Laura's report, select or describe the incident as a phishing attack resulting in compromised credentials.Be specific — a well-described incident is much easier to analyse and learn from later.
-
Set yourself as the owner and assign a priority. Remember: the person set as owner will receive all future notifications for this incident.
-
Once all fields are filled, click Mark as done on section 01. The incident status will automatically update to Described.
- Accepting and documenting an incident immediately creates an audit trail and triggers the response workflow
- Accurate incident type classification determines which response procedures and reporting obligations apply
- Assigning a responsible owner ensures clear accountability so decisions happen quickly under pressure
Assess the Effects
"I've pulled the access logs. The attacker browsed multiple folders and downloaded several files from the sales shared drive — customer contracts, pricing sheets, a few internal reports. This is serious. The account had access to more than it probably should have. We need to classify this properly."
-
Open the incident card and move to section 02 — "What kind of effects did the incident have?"
-
Answer "Was the incident critical?" — based on Jarkko's findings, consider whether this affects important functions of the organisation. Customer contracts and pricing data are core commercial assets.
-
Answer "Was malicious unauthorised access to data identified?" — Jarkko confirmed the attacker browsed and downloaded files. Answer accordingly.
-
Once both fields are completed, click Mark as done on section 02. The incident will automatically move to the Effects stage.
- Honest criticality classification ensures your response matches the real severity — underclassifying delays necessary action
- Confirming unauthorised data access can trigger GDPR breach notification duties within 72 hours
- Impact assessment is not just internal — it determines what you must report to regulators and affected parties
React to the Incident
-
Open section 03 — "How have we reacted to the incident?"
-
Review the Deployed incident response plans field. In a real scenario, you would click Edit to link your existing continuity plan from your ISMS here — for example a plan covering cyber attacks or data breaches. This connects the incident to your documented procedures.If NordChem does not yet have a continuity plan in Cyberday, this is a gap to note for your improvement actions in the next task.
-
Review the Linked tasks field. In a real scenario, you would link relevant tasks already in your ISMS — for example tasks related to access control, email security, or account management. This shows which areas of your security program are relevant to this incident.Linking tasks here helps you see gaps in your current ISMS — if the linked task is still "Untreated", it may have contributed to the incident occurring.
-
Review the Security risks associated field. In a real scenario, you would link the relevant risk from your risk register — for example a risk covering phishing or credential theft. This keeps your risk register connected to real events.
-
Fill in the Other incident response field. This is where you describe the immediate actions taken to contain and manage the incident. Click Mark as done on section 03 when complete.
- Effective incident response balances speed with proportionality — contain the threat without disrupting unaffected systems
- Linking incidents to existing ISMS elements (tasks, risks, plans) shows how your security system works in practice
- Documenting immediate actions creates evidence that your organisation responded appropriately and promptly
Learn From the Incident
"I need to understand how this happened and what we are doing to make sure it does not happen again. The board will ask the same question. I want a clear answer."
-
Open section 04 — "What did we learn from the incident?"
-
Fill in Root cause — what was the underlying reason this incident was able to occur? Think beyond "the employee clicked a link."A strong root cause analysis goes deeper — why was the employee not trained to recognise phishing? Why was MFA not enforced? Why did the account have access to so many files?
-
Fill in Weak points — what gaps in NordChem's security program made this incident worse or harder to detect?
-
Review the Linked security systems, Connected improvements, and Updated or new tasks fields. These use Edit to link directly to your ISMS — see the note box below for guidance on what to link here.
-
Fill in Incident response analysis — how well did the response go? What could have been faster or handled better?
-
Once section 04 is complete, mark it done. Then mark the incident as Closed. Finally go to Incident Management theme → Reports and open the auto-generated incident report to review the full record.
Linked security systems — Click Edit to link the specific systems involved in this incident, such as the Microsoft 365 email system or the shared sales drive. This connects incidents to your asset register.
Connected improvements — Click Edit to link a formal improvement item. For this incident you might create one called "Roll out MFA to all user accounts" or "Restrict shared drive access by role."
Updated or new tasks — Click Edit to link or create tasks that directly address the gaps found. For example: "Activate phishing awareness guideline for all employees" or "Review and tighten access control permissions." These tasks will then appear in your ISMS Taskbook for follow-up.
Incident Closed!
You have taken NordChem's phishing incident from Detection all the way through to Closed — describing what happened, assessing the effects, documenting the response, and turning it into lasting improvements in the ISMS. Laura's account is secure, MFA is rolling out, and the organisation is better prepared for next time.
What's next?
- Root cause analysis must go deeper than surface symptoms — "employee clicked a link" is not a root cause
- Every incident is an opportunity to strengthen your ISMS through concrete, tracked improvements
- Closing the loop (Detection to Closed) demonstrates mature incident management to auditors and stakeholders