Incident Command Platform
← Home

Cyber Incident Response Glossary

Plain-English definitions of the terms that show up in incident command, regulatory notification, and after-action reporting.

AAR — After-Action Review
A structured post-incident document that captures what happened, what worked, what failed, and what the organization will change. See the AAR template.
BEC — Business Email Compromise
A form of targeted social engineering where an attacker impersonates an executive or vendor to redirect payments. Frequently triggers both fraud and breach notification analysis.
CIRM — Cyber Incident Response Management
The Gartner-recognized software category for platforms that coordinate the human side of cyber incident response. See What is CIRM?
Defensible Record
An incident event ledger that can be presented to regulators, auditors, or plaintiffs with confidence that it has not been modified after the fact. See The Defensible Record.
DFIR — Digital Forensics and Incident Response
The discipline and firms that perform forensic investigation and technical response during a cyber incident. Often engaged through outside counsel for privilege.
DPA — Data Protection Authority
The EU supervisory authority that enforces the GDPR. Each member state has its own.
EDPB — European Data Protection Board
The EU body that publishes binding guidance on the GDPR, including Guidelines 9/2022 on personal data breach notification.
Eradication
The NIST 800-61 phase in which the adversary's persistence mechanisms are removed from affected systems. Not the same as recovery.
Hash Chain
A sequence of records where each record's cryptographic hash incorporates the previous record's hash, making post-hoc modification detectable.
IC — Incident Commander
The single named person with decision authority during an incident. See Incident Command Roles.
Item 1.05
The SEC Form 8-K item that requires disclosure of material cybersecurity incidents within four business days of materiality determination. See SEC 96-Hour Notification.
Materiality
The federal securities law standard for disclosure. A fact is material if a reasonable investor would consider it important to an investment decision.
MTTD / MTTR
Mean Time to Detect and Mean Time to Respond. Two of the most-tracked IR metrics.
NIST 800-61
The NIST Special Publication that defines the canonical six-phase incident response lifecycle: Preparation, Detection and Analysis, Containment, Eradication, Recovery, and Post-Incident Activity. See the playbook.
OFAC
The U.S. Treasury's Office of Foreign Assets Control. Enforces sanctions that constrain ransomware payment decisions.
Privilege
Attorney-client privilege and attorney work-product doctrine, applied to incident response when forensics are engaged by outside counsel.
RPO / RTO
Recovery Point Objective and Recovery Time Objective. The maximum acceptable data loss and downtime.
Scribe
The dedicated role that records every decision, notification, and handoff in the defensible record. See Incident Command Roles.
SIEM
Security Information and Event Management. Aggregates and correlates log and telemetry data to detect security events.
SOAR
Security Orchestration, Automation, and Response. Automates technical playbook steps and alert enrichment. Complementary to, not a replacement for, CIRM.
Tabletop Exercise
A facilitated discussion-based exercise where participants work through a simulated incident scenario. See how to run a C-Suite tabletop.
Tenant Isolation
Architectural separation between customer data in a multi-tenant SaaS platform. In IR-OS, enforced via Postgres row-level security.