Research: out of band communication
75% draft
PURPOSE
This document defines the reasoning for and capabilities of out-of-band communication. The purpose of this document is to educate the reader on the value proposition of out-of-band communication and analyze potential competitive offerings for Mattermost within the marketplace.
HISTORY
February 8, 2024: Document migrated to Fast Futures Confluence.
October 27, 2023: Document reorganized with a new table of contents; added feature roadmap and competitor matrix.
October 17, 2023: Document created; MVP drafted.
OVERVIEW
Out-of-band communication takes place outside of a company’s primary corporate network, allowing employees to communicate and collaborate securely even when the primary network becomes unavailable or compromised. It exists independently and is not connected to daily communication systems. Out-of-band communication supports an organization’s business continuity plan. This form of communication prioritizes security and should be relatively easy for staff to access, learn, and utilize. Common forms of out-of-band communications include:
Private and public text channels, including audio, video, and screenshare;
Non-company email accounts;
File-sharing tools;
One-way alerting and messaging to all employees.
To bolster security, many out-of-band communication channels incorporate multi-factor authentication (MFA) and end-to-end encryption (E2EE). Even the modes of authentication (e.g., everyday SSO like Okta) and encryption for out-of-band communication must exist outside of the primary corporate network.
KEY INSIGHTS
Out-of-band communication is a contingent tool designated for mission-critical and/or highly-sensitive conversations, especially during mission-critical incidents.
Out-of-band communication plays a pivotal role in incident response and collaboration.
Out-of-band communication must be secure, compliant with regulations, and focused on the task at hand.
Out-of-band communication should avoid relying on standard infrastructure, authentication, and encryption.
Out-of-band communication includes email, voice, real-time communications, mass one-way communications for all personnel, and file storage.
Organizations must ensure that their out-of-band communication adheres to internal legal protocols.
It is imperative to establish and test your out-of-band communication systems before an incident materializes. Moreover, regular (annual at minimum) testing of OOB is recommended to guarantee its optimal performance.
Out-of-band communication should work and be available at all times.
TERMINOLOGY
Out-of-band communication: A communication method that operates independently of the primary or regular communication channels, used for mission-critical and/or highly-sensitive communication between key stakeholders, and/or by personnel during emergencies.
Corporate network: The digital infrastructure that facilitates internal and external communication within a company.
MFA (multi-factor authentication): A security process where users provide multiple verification methods to confirm their identity.
E2EE (end-to-end encryption): A form of encryption ensuring that data transmitted between two parties cannot be deciphered by any intermediate system.
Incident response and collaboration: The process of multiple teams working together to manage, respond, and recover from a significant unplanned event or disruption.
Business continuity plan: The systematic process and set of protocols developed by an organization to anticipate, prepare for, respond to, and recover from potential threats or disruptions to its operations.
HOW DOES IT WORK?
Preparation is the key to an effective out-of-band communication system. Organizations should conduct regular drills, ensuring that stakeholders are well-versed with the communication channels, their usage, and their efficiency. While it's not necessary to have every employee set up for out-of-band communication, a system for emergency, one-way communication is beneficial (at a minimum). Only personnel that are pivotal to the organization's incident response and recovery should have full access to the system.
Out-of-band communication should be perceived as a provisional setup, employed while restoring the primary communication systems and verifying their security integrity. However, certain mission-critical and/or highly-sensitive communication may potentially only exist in out-of-band communication systems, to prevent your incident response workflows from being anticipated and counteracted in the event of a compromise. In a major cyber attack, normal means of communication should be assumed compromised.
How does an organization coordinate a breach response if it can’t trust its own communications? That’s the role out-of-band communication plays in a business continuity plan. The absence of proactive resilience, especially during massive infrastructure failures or security breaches, can lead to costly downtime.
An organization should review and update its business continuity plan on a regular basis. Evaluating helps uncover shortcomings, allowing organizations to consider factors such as:
Mistakes: In high-tension situations, the likelihood of mistakes rises due to the intense pressure. It's crucial to ensure that the crisis management team can handle stress and isn't navigating the plan for the first time during an actual crisis.
Volume: A barrage of email alerts can be daunting, leading employees to disregard crucial crisis notifications. It's imperative for organizations to communicate effectively, ensuring messages reach the intended recipients promptly and through a secure mode they'll notice.
Timing: In crisis situations, every moment is crucial, and delays due to manual interventions can be detrimental. Implementing digital solutions for crisis responses, grounded in set protocols and critical event management tools, can bolster organizational resilience.
Remote: The shift to remote work means teams are often spread out, which can heighten the risk of missteps during crisis response when team members aren't co-located.
Key Features
Feature | Pros | Cons | Questions |
Stand-alone user provisioning, access control, & authentication | A requirement of OOB is to have a separate source of identity, this allows us to prescribe that spec |
| Can we integrate with Microsoft Entra?
Could we use IAM or something like Descope? Identity federation for all your apps | Descope
|
Integrated compliance and e-discovery capabilities |
|
|
|
E2E encryption and decentralized key management |
|
|
|
Controlled file sharing |
|
|
|
Secure data management and monitoring |
|
|
|
Federation and shared channels, bridges to other apps | Potentially part of SBIR roadmap already |
|
|
One-way message broadcasting |
|
|
|
Message “burn” / self-destructing messages | Useful to transmit highly secure, one-time information during incidents | Works counter to eDiscovery and compliance tools |
|
CONVERSION TO PAID
Trigger | Pros | Cons | Questions |
Need more users |
|
|
|
Need longer data retention |
|
|
|
Need higher file size limits |
|
|
|
Need enterprise-level support |
|
|
|
Need eDiscovery capabilities |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
COMPETITOR MATRIX
Competitor | Description/pitch | Primary relevant features | Freemium offering | Conversion to paid |
“Protecting communications with end-to-end encryption Secure collaboration across messaging, calling, file sharing, and screen sharing.” | Closed source
Secure Industry Leading End-to-End Encryption
Zero Trust Platform Design Advanced Security Features
Compliant Manageable Security and Administrative Controls
Automatic Enforcement of Data Retention Policies
Centralized Message Archiving Capability
1:1 and Group Messaging, Teleconference and File Sharing Enterprise Integrations (SSO, MDM, etc.) and Bots
Federated SaaS and On-Premise Deployment Options | AWS Wickr Pricing | Secure Collaboration Solution
Up to 30 users. 1:1, group chats, and rooms Data expiration timer of up to 30 days Maximum 1 GB file attachment Limited storage Voice and video calls up to 100 people Secure screen sharing Extensible workflows Federated users | For small and large business teams that need administrative controls and flexibility.
For businesses that require highest feature limits, granular administrative controls, and immediately available data retention.
The only secure enterprise workspace with multiple deployment options, fine grain controls, policy, and data retention solutions right out of the box.
Unlimited users Data expiration timer of up to 1 year Maximum 5 GB file attachment Self hosted within customer environment 24/7 SLA Pre-configured security groups Data retention and eDiscovery capabilities***
| |
“For over 30 years, Ercom has developed a leadership position in the communications, data and terminal security markets. This position is based on complementary technological expertise in telecom/cloud infrastructure, cryptography and software and on shared values: innovation, expertise, commitment and confidentiality.
Thanks to its ability to adapt and its SaaS strategy, Ercom is able to meet the needs of both large companies and SMEs with certified security solutions that comply with the highest functional requirements.” | Closed source
Chat and file sharing Send messages and share files without limit up to 200MB per file!
End-to-end encryption To be activated when necessary: all your messages, documents, multimedia files and calls are encrypted.
Encrypted calls With encrypted HD telephony functionality, make calls securely from anywhere.
Operated by Thales, hosted in France The service is developed by Thales security teams and hosted on Thales and OVH infrastructures.
Administration console Access the complete list of your users (enable or disable an option, deactivate an account, disconnect a terminal etc.) | (information not available on their website) | (information not available on their website) | |
“Element is led by the creators of Matrix, the decentralized open standard for secure and sovereign real time communication.” | E2EE Protocol vs. platform Open source
Secure and compliant. Protect and strengthen business critical communications.
Control your data. Open source and flexible hosting to enable data sovereignty.
Connect with partners. Trusted communication in real-time across organizations.
Communicate and collaborate with people and organizations you trust.
Choice. Choose how you host, share and manage your data.
Freedom. Freedom to structure discussion spaces and customize chat rooms.
In real time, all the time. Instant messaging, voice/video calls, location sharing, voting polls and much more...
Boost collaboration. Share live data through widgets and integrations to supercharge your productivity.
Secure by default. Our technology protects your data while you focus on getting your work done.
Admin console. Provides a streamlined way to manage your network configurations and permissions.
Identity management. ID management and access control using SSO and ACLs.
Bridges. Connect to internal and external partners based on siloed communication apps.
Complete independence. Own and control your entire communication platform.
Powerful federation. Configure networks to suit organizational requirements.
Reduce risks. Strengthen cybersecurity and business continuity plans. | Free up to 200 users Features include:
End-to-end encryption by default
Instant messaging and video calls
Admin controls
| Enterprise. Advanced controls $10 per user/month (paid annually) Business features, plus:
Self-hosted or fully managed
Auditing & reporting for compliance
Custom DNS
Group Sync for access control Self-hosted
Sovereign. Custom deployments Priced per deployment Enterprise features, plus:
Nationwide scalability
Antivirus / Content scanner
Custom mobile push gateway
Dedicated identity server
Branded mobile app (min 5K users)
| |
“The collaboration platform for organizations that handle sensitive business or customer data.” | E2EE Federates over Matrix protocol Open source
Built for teams that need more control
100% in Control Own your conversations. Choose from self-hosted, air-gapped or secure cloud deployment options that meet your security and compliance needs.
100% Privacy E2E encrypted, ISO 27001 certified, and supporting compliance with GDPR, CCPA, LGPD, and HIPAA.
100% Customizable Integrate with your ecosystem using our open API. Enjoy a wide range of customization and white-labeling options. Perfect as in-app or livestream chat.l | Community The basics to get small teams started. Deploy and host the free version of Rocket.Chat on your own server. $0 /user/month Deploy now Includes:
Team collaboration Unlimited 1:1 and group messaging Basic user sync OAuth basic social logins Two-factor authentication End-to-end encryption Full messaging history 1:1 federated messaging Distribute inquiries across available agents Analytics and real-time monitoring Livechat Email (basic) SMS (basic) Scalability Up to 10,000 push notifications per month Up to 5 active marketplace apps Up to 3 private apps Presence service for up to 200 concurrent users Support Peer-to-peer community assistance Deployment options Self-managed | Enterprise The highest level of security, regulatory compliance, performance and scalability. Pricing based on number of team collaboration users & omnichannel agents. Volume discounts may apply. $7 /user/month Minimum of 25 users or $35 /agent/month Minimum of 5 agents
Team collaboration Unlimited & secure push notifications Full Matrix Federation Advanced identity management Centralized admin controls Auditing capabilities and granular audit logs Data loss prevention Video conferencing integrations Custom roles and permissions Guest users Custom white-label branding Delivered/read receipt
Omnichannel customer collaboration Templated messages for common messages Route returning customers to previous agent High impact inquiry prioritization Queue waiting time display Mobile app for agents Inquiry forwarding across teams and departments Multiple queues & departments Conversation priority indicators Expanded transcript exports
Channels Facebook Messenger WhatsApp Business Instagram Direct Telegram Email (premium, coming soon) SMS (premium, coming soon) VoIP
Scalability Unlimited & secure push notifications Unlimited marketplace apps Unlimited private apps Uncapped presence service Microservices scaling Multiple instance scaling
Support Web support portal
Deployment options Choice of self-managed or secure cloud Standard Cloud hosting plan
| |
WhatsApp/SMS | “Simple, reliable, private messaging and calling for free, available all over the world.” | Commonplace (everyone has it, probably) Consumer app (not designed for enterprise) | End user service | No professional plans |
“Share Without Insecurity State-of-the-art end-to-end encryption (powered by the open source Signal Protocol) keeps your conversations secure. We can't read your messages or listen to your calls, and no one else can either. Privacy isn’t an optional mode — it’s just the way that Signal works. Every message, every call, every time.” | E2EE Consumer app (not designed for enterprise) | Fully free, intended for end users (not business) | No professional plans | |
“Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.” | E2EE
Simple Telegram is so simple you already know how to use it.
Private Telegram messages are heavily encrypted and can self-destruct.
Synced Telegram lets you access your chats from multiple devices.
Fast Telegram delivers messages faster than any other application.
Powerful Telegram has no limits on the size of your media and chats.
Open Telegram has an open API and source code free for everyone.
Secure Telegram keeps your messages safe from hacker attacks.
Social Telegram groups can hold up to 200,000 members.
Expressive Telegram lets you completely customize your messenger.
| Fully free, intended for end users (not business) | Premium for end users:
Premium Telegram Premium By subscribing to Telegram Premium, users unlock doubled limits, 4 GB file uploads, faster downloads, exclusive stickers and reactions, improved chat management – and a whole lot more.
At the same time, all existing features that users have come to expect and rely on for nearly a decade remain free. Moreover, non-premium users will be able to enjoy some of Premium's benefits: for example, download the extra-large documents and view stickers sent by premium users, as well as tap to increase counters on premium reactions that were already added to a message.
The contributions of premium subscribers will help improve and expand the app for decades to come, while Telegram will remain free, independent and uphold its users-first values, redefining how a tech company should operate.
| |
“Everbridge 360™ empowers organizations to anticipate, mitigate, respond to, and recover stronger from critical events. Our unified platform digitizes organizational resilience by combining intelligent automation with the industry’s most comprehensive risk data to Keep People Safe and Organizations Running™.” | Critical Event Management (CME)
Everbridge 360™ represents our relentless dedication to provide our customers with the most comprehensive and unified interface to manage critical events across one single platform so you can know earlier, respond faster, and improve continuously.
More effectively manage critical events, minimize communication delays, and improve overall organizational resilience through the industry’s most advanced and unified dashboard. |
|
| |
“Phantom’s flexible app model supports hundreds of tools and thousands of unique APIs, enabling you to connect and coordinate complex workflows across your team and tools. Powerful abstraction allows you to focus on what you want to accomplish, while the platform translates that into tool-specific actions. Phantom enables you to work smarter by executing a series of actions — from detonating files to quarantining devices.” | Splunk Phantom is a Security Orchestration, Automation, and Response (SOAR) system. The Splunk Phantom platform combines security infrastructure orchestration, playbook automation, and case management capabilities to integrate your team, processes, and tools to help you orchestrate security workflows, automate repetitive security tasks, and quickly respond to threats. |
|
| |
“Secure communications for everyday devices” | Armour Mobile/Desktop Our flagship product, Armour Mobile provides all the functionality of consumer-grade apps but with considerably greater security. It provides secure voice calls, video calls, one-to-one and group messaging, voice and video conference calls, file attachments, sent/ received/read message status and the option for messages to automatically delete once read or after a set time (MessageBurn).
Most importantly we protect not only the content of communications, but also the associated meta-data. This means no-one even knows you are having a conversation, let alone what that conversation is about. Armour Mobile prevents mobile communications whether voice, text, video or conference from being intercepted by devices such as IMSI catchers, or hacks using the SS7 protocol and others. It enables secure collaboration between trusted colleagues when discussing commercially sensitive information such as corporate intellectual property, financial transactions, and customer details.
With Armour Desktop, which works with a Windows 10 softphone, and integration with Unified Comms, organisations are able to take advantage of the reduced costs and increased flexibility provided by Voice over IP.
SigNet by Armour SigNet by Armour is an alternative to our flagship product Armour Mobile, developed to suit specific security and operational requirements. SigNet provides secure voice, video, messaging, group chat, file attachments and Message Burn (timed messages) with AES-256 bit encryption, with an on-premises option for total privacy and no auditability. SigNet provides the same ease of use as consumer grade apps and is available for Android and iOS devices and for Windows 10 and Mac OSX desktops. This new product line will run concurrently with Armour Mobile.
SigNet uses a peer-to-peer key management system, specifically a double ratchet algorithm with pre-keys and 3-DH key management to provide confidentiality, integrity, authentication, participant consistency, destination validation, forward secrecy, future/backward secrecy, causality preservation, message unlinkability, message repudiation, participation repudiation, and asynchronicity. | No free tier | More like a consultant/whitelabel/partner with an internal service/deployment stack they’ve developed | |
“Secure Out of Band Collaboration Securing Your Most Critical Roles and Operations” | ArmorText Features ArmorText was built to secure your your most critical roles and operations.
End-to-End Encryption What sets ArmorText apart is our unique User+Device and Scope-of-Review specific E2EE approach.
Data Sovereignty Meets sovereignty requirements without forcing you to self-host or operate multiple instances across geographies.
E-Discovery End-to-end encrypted retained archives, in-console review, and native support for RSMF & JSON exports for e-discovery.
100% In the Cloud Out-of-Band means never relying on on-premise or in-network infrastructure. ArmorText works even when everything else is down.
1:1 & Group Collaboration Messaging, file sharing, voice, video, and screen sharing.
Enterprise Controls Policy enforcement, user management, and federated Trust Relationships.
Secure Onboarding Day-to-day and in-crisis onboarding approaches for maximum security.
Reserve Capacity For when business continuity requires moving operational communications out-of-band.
Trusted Integrations End-to-end encrypted integrations via the ArmorText Secure Gateway. |
|
| |
“Secure instant messaging for business All in one app - chat, video conferencing & much more 100% GDPR compliant & police security standards” | Intuitive messaging
Everything you are used to from private messaging
Group chats Voice messaging Photo, video, and file sharing Voice and video calls Our messaging features
Effective collaboration
All features for better collaboration
Video conferencing Broadcasting & distribution lists Status messages Alerts for emergencies Push-to-Talk Interface Live location features Our teamwork features
Maximum security
Data protection & data security at the highest level
100% GDPR compliant Absolute data sovereignty Complete encryption of all data “Zero Trust” security concept German cloud or on-premise hosting Fail-safe infrastructure Security with Teamwire
Central administration
Easy administration – ideal for medium and large enterprises
User and device management Connection to Active Directory More than 50 security and compliance policies Controllable app container Compatible with MDM and UEM solutions Audit-proof archiving & audit logs | No free tier | Starter
For small businesses, for which basic features for messaging and sharing are sufficient €1.75 user/month* For small businesses, for which basic features for messaging and sharing are sufficient Try for Free License conditions: Maximum devices per user: 1 German cloud Standard
For organizations, that want to cover all relevant use cases from messaging to video conferences €3.45 user/month* For organizations, that want to cover all relevant use cases from messaging to video conferences Contact Sales License conditions: Maximum devices per user: 3 German cloud Professional
For larger enterprises, who require advanced administration and comprehensive integrations Price on request Contact Sales License conditions: Maximum devices per user: 5 German cloud, private cloud or on-premise hosting
| |
“The Perfect Features in Your Business Messenger You want uncompromising security for your business communication, in combination with the best possibilities of modern messaging? stashcat is the messenger you can use to professionalize your communication: With true End-to-End Encryption, you use a GDPR compliant communication tool “Made in Germany”, which is developed with businesses for businesses.
Get a comprehensive overview of the Features such as Chat, File Storage, Voice and Video Calls, Video Conferencing and much more, and see how easy the usage is for users and administrators.” | Multipurpose, safe and easy to use Overview of the most helpful Features
Messenger Features and Chat Chat with all your colleagues in individual and group conversations or in #Channels - just as you like. Or keep... About Messenger features ➔
File Storage and Management Your files are now available to you anywhere and on any device - thanks to the secure stashcat cloud. Share... Learn more about the cloud ➔
Voice and Video Calls, Video Conferencing Call your colleagues with one click: Via end-to-end encrypted voice or video call directly in stashcat, or video conferencing for... More than just instant messaging ➔
Team Work: Collaboration Tools Work together with stashcat: Appointments and coordination can be done easily with the integrated calendar and survey module. Guest accounts... Connect them all ➔
Privacy and Push Notifications stashcat offers privacy settings for status, location, read receipts and call blocking. Incoming messages are signaled to users via push... Your messenger, the way you need it ➔
Organization Management and Administration stashcat already provides business communication to many customers, even with their own branding, on your organization's servers. Make individual settings,... Administrate and communicate easily ➔
Safety Features Delete your content automatically after a desired period of time or protect it additionally by masking the content. If mobile... It's that safe the police use it, too ➔
Contacts and Contact Management All contacts of your organization at hand thanks to integrated contact book: Replace existing distribution lists, phone chains or WhatsApp... Get in touch, without a mobile number ➔
| No free tier | 1 or 12 months contract period Prices on request Test 30 days without obligation
Unlimited number of users Test 30 days Free of Charge Channels, Private and Group Chats File Storage Calendar Tool with Synchronization Integrated Survey Tool Voice and Video Calls Video Conferencing Branding: Own Company App Private Cloud or OnPremise Individual Extensions Test 30 days without obligation Individual contract terms Prices on request
Unlimited number of users Test 30 days Free of Charge Channels, Private and Group Chats File Storage Calendar Tool with Synchronization Integrated Survey Tool Voice and Video Calls Video Conferencing Branding: Own Company App (optional) Private Cloud or OnPremise (optional) Individual Extensions (optional)
| |
| Zero-knowledge security Efficient employee communication Powerful user management Comprehensive security parameters
More Than Just Messaging Cutting-Edge Secure Messenger for Companies
Threema Work is an instant messenger that meets your employee’s needs: it’s easy to use and packed with features. Offer your employees a secure and privacy-compliant alternative to regular messaging services for efficient team communication. Secure and proven messenger for companies as an alternative to regular chat apps
Administration Tool Learn more → The backbone of the business communication software Threema Work is its management cockpit. This is where you define the ways in which your employees can use the Threema Work app – regardless of whether they're using corporate devices or their own (BYOD).
Broadcast Broadcast Learn more → With a single click, you reach the entire workforce, individual departments, all suppliers, or specific customers. Threema Broadcast offers the perfect communication channel for every use case. | No free tier |
Essential For companies with only a few users and low demands on business features
Per user, per month
$ 2.00 Annual payment
Max. number of licences: 50 POPULARProfessional Professional For companies with high standards regarding customization, administration, and automation
Per user, per month
$ 3.50 Annual payment
Max. number of licences: Unlimited Advanced For companies with low requirements in terms of customization, administration, and automation
Per user, per month
$ 2.50 Annual payment
Max. number of licences: 500
All app features
Management Cockpit
App configuration
Threema Broadcast
APIs
Basic Support Support & Customer Success Premium Support Standard Support
| |
“PROTECT YOUR MULTI-PARTY LAUNCH ENVIRONMENT ENSURE THE INTEGRITY AND CONFIDENTIALITY OF YOUR DATA AND SYSTEMS.” | Securing Space-Based Communications Communicate on any system with confidence. OrbitSecure provides end-to-end security on vulnerable systems and networks.
OrbitSecure automatically embeds airtight security into your commands and data using secure data compartments (SDCs).
Now you can confidently store or transmit information anywhere. | No free tier | Specialized for space communication and deployments, but follows OOB recommendations | |
“The Secure Communications Solution you can trust
With advanced security and encryption, you can trust that your data is protected with Salt. Whether you’re sharing it over mobile or desktop devices, meetings and conversations are now as productive and private as those held in person.” | Salt App Features Secure Messaging Our bespoke solution provides users with private and secure real-time messaging and group chat for their Salt contacts.
Secure Voice Calls Our secure solution offers one-to-one calls and conferences for up to 16 participants, as well as encrypted VoIP calls worldwide.
Encrypted File Transfer Salt enables secure transfer of confidential documents and sensitive images with end-to-end encryption for multiple attachments.
Message Burn Our burn feature completely erases information from all devices, either manually or with a timer setting.
Message Broadcasting Share live alerts, messages, images, and documents freely and quickly with large groups within an organisation.
Screenshot Protection Administrators can restrict users from taking screenshots for optimal internal security. If taken, users will be notified immediately. | No free tier |
| |
“By leveraging always-on end-to-end encryption, default zero-trust authentication, and granular role/attribute-based access controls, HighSide helps organizations retain full control over when and where their data can be accessed, on what devices and by which authorized users.
HighSide empowers your team to securely store, share and collaborate on your most sensitive data via a hyper-secure file sharing and collaboration platform designed to meet even the most stringent compliance regulations and data governance requirements.” | HighSide One: Features & Capabilities
File Sharing Collaboration Data Management Messaging Voice & Video Access Control Compliance Deployment Options
|
|
|
PROCEDURE
BEFORE
Have a plan
Follow best practices: PACE (primary, alternate, contingent, emergency)
Be granular: per department, per team, per role
Identify your attack surfaces
Review and update your plan regularly
Hold fire drills and test your plan
DURING
Notify all staff via emergency one-way communication
If systems are compromised, you may need to inform team members to not even log into things. And you need to tell critical teams that something is happening and where to do
Assemble on out-of-band communication platform
Chaos vs. prescribed
Why do this on a collaboration tool instead of traditional communication like SMS and email?
Stay in touch
Staying in touch is critical.
Panic is the enemy
You can be your own worst enemy
Analogies:
Building evacuation plan and drills
AFTER
Review what happened holistically
Share what was learned, what worked, what didn’t
Update your business continuity plan based on feedback
FURTHER READING
Using Out-of-Band Communication to Bolster Incident Response | AWS Wickr
To OOB, or Not to OOB?: Why Out-of-Band Communications are Essential for Incident Response
2019 Baltimore ransomware attack - Wikipedia
“The attack had a negative impact on the real estate market as property transfers could not be completed digitally due to the system being down, as the city's card payment system and debt checking application were rendered inaccessible. In addition, city employees were unable to use their email system and resorted to creating Gmail accounts as a workaround. Google automatically blocked their accounts at first due to the large number of accounts created in that timespan, though the company later restored the Gmail accounts.”
Understanding Out-of-Band Communication and the role it plays in cyber attack response
Out-of-band communication: Maintaining business continuity - Mattermost