We often picture incident response (IR) as a perfect machine. Alarms ring, the team acts, and they stop the threat with precision. Reality looks different. A major breach feels less like a movie and more like a chaotic “fog of war.”
Incident response plans Jon David, Managing Director at NR Labs, identifies the biggest vulnerabilities. They aren’t technical. They are human. David recently discussed these failures with Help Net Security. He explained why IR plans often crumble under pressure. We spend millions on tools. Yet, we neglect the trust and communication that actually determine success.

The Speed of Trust vs. The Speed of Attackers
Speed determines the outcome of a breach’s first few hours. Attackers move fast. They often automate their lateral movement. Defenders usually move slower due to hesitation. David notes that a lack of authority causes this delay. An analyst might see an issue but fear “stopping the line.” They worry about upsetting a business unit. That pause can be fatal.
Effective Incident Response Plans must empower the team. They need to make tough calls without a meeting. When teams pause, attackers dig deeper into the network.
The Noise Problem: Alert Overload
Data volume creates another friction point. Security Operations Centers (SOCs) face thousands of notifications daily. This leads to a dangerous issue called alert fatigue. Analysts get used to constant warnings. Then, they miss genuine red flags.
David notes this overload affects leadership too. Executives often lack clear information. It gets buried in jargon or lost in the noise. Intelligence must flow smoothly from the SOC to the boardroom. Leaders fly blind without it. They cannot assess the risk until it is too late.
Communication: The First Casualty

Truth often dies first in war. Communication dies first in cyber incidents. David highlights poor escalation paths as a primary failure point. Defenders lose the race against attackers because of this. You need more than a Slack channel. Legal, PR, and technical teams must speak the same language.
Aligning these groups is hard. However, it is necessary. The NIST Incident Response Lifecycle emphasizes coordination. It is as vital as containment. Legal might worry about liability. Meanwhile, IT tries to rip out cables. This paralysis helps the adversary.
The Risks of Timing: Too Early vs. Too Late
David shares a nuanced insight on timing. Acting too late is obviously bad. However, acting too early damages the response too. A team might move to contain a threat too soon. They might not fully understand its scope. This alerts the attacker. The enemy then goes dormant or destroys evidence.
Balancing this requires patience. A structured IR process is crucial. It guides the team on when to watch and when to strike. This preserves evidence for future remediation.
Practice Makes Perfect: The Role of Tabletop Exercises
How do we fix this? Experts agree on one solution: preparation. You cannot build a plan while the building burns.
Teams must run regular tabletop exercises. These should include everyone. Involve leadership, HR, legal, and communications. These simulations build “muscle memory.” They expose communication gaps before a real adversary attacks. Many incident response phases highlight “Lessons Learned.” These lessons shouldn’t only come after a disaster. They should come from practice.
Also Read : Moltbot viral surge exposes AI agent security risks
