Skip to content

🚨 Incident Management (MVP)

What It Does

Simple incident logging and tracking for cybersecurity events.

Core Featurest

1. Incident Logging

  • Quick form to capture basics
  • Severity levels (Low/Medium/High/Critical)
  • Automatic timestamp
  • Assign to responder

2. Response Tracking

  • What happened?
  • What did we do?
  • Is it contained?
  • What's the impact?

3. Board Reporting

  • Auto-include in board reports if High/Critical
  • Summary of all incidents
  • Lessons learned
  • Improvement actions

Simple Incident Process

  1. Detect - Something suspicious happens
  2. Log - Create incident record immediately
  3. Assess - How bad is it?
  4. Respond - Take action to contain
  5. Report - Update stakeholders
  6. Learn - What can we improve?

Common Incidents (Examples)

  • Suspicious email reported
  • Account compromise suspected
  • Unusual system behavior
  • Failed backup detected
  • Ransomware attempt

Regulatory Requirements

Must report to ACSC if:

  • Customer data compromised
  • Ransomware successful
  • System availability impacted

GetCimple helps by:

  • Reminder of reporting requirements
  • Template for ACSC report
  • Tracking report submission

Business Value

  • Never lose track of incidents
  • Learn from each event
  • Show improving response over time
  • Ready for auditor questions

Simple incident tracking. Clear process. Better each time.