Some companies mistakenly assume that a cyber-attack is just an IT problem. In fact, almost all departments in an organisation need to be involved in the response to such an incident. The diagram to the right gives a very simplified picture of the main stages in how a cyber incident plays out.
First, bear in mind that the response may not be triggered until several months after the systems have become compromised. Times to detection can easily be this long and the notification of suspicious activity will need to be escalated several times up the bureaucratic hierarchy before a formal breach response is triggered.