Security Incident Contacts Sheet
A comprehensive emergency contact sheet for security incidents. Keep this information readily accessible to all incident response team members for quick escalation and communication during critical situations.
Emergency Response Priority
Data breach, ransomware, complete outage
Call immediately:
1. Incident Response Leader
2. Executive Leadership
3. Legal Counsel
Malware, compromise, service outage
Call within 1 hour:
1. Incident Response Leader
2. IT Manager
3. Security Lead
Suspicious activity, minor breach
Call within 4 hours:
1. IT Manager
2. Security Lead
Failed logins, spam, minor anomaly
Document & monitor:
1. Security Lead
2. IT Support
Incident Response Leader
[Name]
[Title]
(___) ___-____ incident-lead@company.com Alt: (___) ___-____
Primary decision maker for all incidents
IT Manager
[Name]
[Title]
(___) ___-____ it-manager@company.com Alt: (___) ___-____
Technical systems and infrastructure
Security Lead
[Name]
[Title]
(___) ___-____ security@company.com Alt: (___) ___-____
Security tools and threat analysis
Executive Leadership
[Name]
CEO/President
(___) ___-____ ceo@company.com Alt: (___) ___-____
Final authority for major decisions
Legal Counsel
[Law Firm Name]
Attorney
(___) ___-____ legal@lawfirm.com Alt: (___) ___-____
Breach notification and legal requirements
Privacy Officer
[Name]
DPO/Privacy Officer
(___) ___-____ privacy@company.com Alt: (___) ___-____
GDPR, CCPA, and privacy compliance
Compliance Manager
[Name]
Compliance Officer
(___) ___-____ compliance@company.com Alt: (___) ___-____
Industry-specific compliance requirements
Cyber Insurance Provider
[Insurance Company]
Claims Department
1-800-XXX-XXXX cyberclaims@insurance.com Alt: Policy #: __________
Report breaches within 24-48 hours
Forensics Firm
[Forensics Company]
Incident Response Team
1-800-XXX-XXXX emergency@forensics.com Alt: (___) ___-____
24/7 emergency response available
MSP/IT Support
[IT Company Name]
Emergency Support
1-800-XXX-XXXX emergency@itcompany.com Alt: Account #: __________
Managed services and infrastructure support
Public Relations
[PR Firm/Agency]
Crisis Communications
(___) ___-____ crisis@prfirm.com Alt: (___) ___-____
Media relations and public communications
FBI Cyber Division
Internet Crime Complaint Center
IC3
File online report https://ic3.gov Alt: Local FBI Field Office
For cybercrime reporting
State Attorney General
[State] AG Office
Consumer Protection
(___) ___-____ cybersecurity@state.gov Alt: Online reporting available
State breach notification requirements
Local Police
[City] Police Department
Detective Division
(___) ___-____ detective@police.gov Alt: 911 (emergencies only)
For criminal activity or threats
Regulatory Body
[Industry Regulator]
Compliance Department
(___) ___-____ compliance@regulator.gov Alt: Online portal available
Industry-specific reporting requirements
Cloud Provider
[AWS/Azure/GCP]
Security Team
1-800-XXX-XXXX security@cloudprovider.com Alt: Support ticket system
Infrastructure and security services
Payment Processor
[Payment Company]
Fraud Department
1-800-XXX-XXXX fraud@payments.com Alt: Merchant account #: ______
Payment card data incidents
Key SaaS Provider
[Software Company]
Security Response
1-800-XXX-XXXX security@saasprovider.com Alt: Customer success manager
Critical business application provider
Internet Service Provider
[ISP Name]
Business Support
1-800-XXX-XXXX business@isp.com Alt: Account #: __________
Network connectivity and security
Escalation Decision Matrix
| Severity | Response Time | Who to Contact | Key Actions | Examples |
|---|---|---|---|---|
| Critical | Immediate |
|
|
|
| High | < 1 Hour |
|
|
|
| Medium | < 4 Hours |
|
|
|
| Low | < 24 Hours |
|
|
|
Communication Templates
Initial Incident Alert
Status Update
Incident Resolution
Contact Management Best Practices
Maintenance Checklist
Access & Distribution
- ✓ Store securely but accessibly (password manager)
- ✓ Provide to all incident response team members
- ✓ Include in incident response kits/go-bags
- ✓ Post in secure team collaboration tools
- ✓ Have offline/printed backup copies
- ✓ Train team on using the contact sheet
During an Incident
- ✓ Stay calm and follow procedures
- ✓ Call appropriate contacts immediately
- ✓ Document all communications
- ✓ Use secure communication channels
- ✓ Brief contacts on situation status
Communication Tips
- ✓ Lead with severity and impact
- ✓ Provide clear, factual information
- ✓ Set expectations for next update
- ✓ Use established escalation paths
- ✓ Confirm receipt of critical messages
After Resolution
- ✓ Notify all stakeholders of resolution
- ✓ Schedule post-incident review
- ✓ Update contact information as needed
- ✓ Document lessons learned
- ✓ Thank external partners for assistance
Keep Your Team Connected During Crisis
Download and customize this contact sheet for your organization. Regular maintenance and training ensure your team can respond quickly and effectively when every minute counts.
Stay Updated
Subscribe to our newsletter for cybersecurity news and updatesWe respect your privacy. Unsubscribe at any time.