When a breach occurs, having a plan of attack is critical to the risk mitigation and reporting obligations that are often mandated. Whether self-imposed or at the direction of regulators or the court, the breached organization's compromised data will need to be analyzed, reviewed, and summarized. Effective planning and communication among the various stakeholders will drive efficiencies, reduce costs, and lead to successful completion of the review. This article will prepare you to lead, manage, or contribute after a breach impacts your organization.