
What does a good AI use case look like?
With AI fever in overdrive, everyone is searching for winning AI use cases. However, the process feels like solving a giant jigsaw puzzle without a picture on the box to guide you....

by Öykü Işık Published April 5, 2022 in Brain Circuits • 2 min read
Cyberattacks are part of the reality of doing business in today’s world, so any organization –whether large or small – needs to have a plan in place in terms of how they will handle a security breach when it occurs.
There are certain key questions you should be asking right now to ensure you are prepared to act quickly when your systems are hacked. Here are four essential ones:
Sometimes, the easiest way for a hacker to get in is simply to pose as someone from your organization – such as the IT department – and ask an employee for passwords. Make sure all employees are trained to be aware never to give out passwords, and never to click on something from an unknown source.
All it takes is one tired employee at home to be a little forgetful and accidentally click on a nefarious link. These kinds of social engineering attacks are used in more than 80% of the cyberattacks today, so it is rarely about highly sophisticated technical breaches.
Make sure everyone is aware that suspicious individuals, phone calls, e-mails, links and questions must always be treated with caution.
Communicating clearly and quickly with customers about any sensitive information that has been breached is critical. You will need to determine who needs to know what and how to inform them. And the way this is handled can mean a lot for your company’s reputation.
For this reason, your communications team should have someone pre-designated to deal with a crisis, and a cyberattack in particular, so they are ready to advise the minute something goes wrong. If no one on your communications team has experience with this sort of incident, get them trained now.
This is the team that will assemble to handle the attack. As previously mentioned, it should involve someone from communications and PR in addition to technical, security and legal advisors.
Every country has some sort of data protection authority, and they have a lot of excellent advice to give. If your company is attacked and you tell them it is the first time that it has happened, they can give you points of contact for assistance.
While cyberattacks are something no company wants to deal with, they are a reality in today’s digital landscape. And the better prepared you are ahead of time, the smoother things will go when a breach occurs.

Professor of Digital Strategy and Cybersecurity at IMD
Öykü Işık is Professor of Digital Strategy and Cybersecurity at IMD, where she leads the Cybersecurity Risk and Strategy program and co-directs the Generative AI for Business Sprint. She is an expert on digital resilience and the ways in which disruptive technologies challenge our society and organizations. Named on the Thinkers50 Radar 2022 list of up-and-coming global thought leaders, she helps businesses to tackle cybersecurity, data privacy, and digital ethics challenges, and enables CEOs and other executives to understand these issues.

2 hours ago • by Didier Bonnet, Achim Plueckebaum in Brain Circuits
With AI fever in overdrive, everyone is searching for winning AI use cases. However, the process feels like solving a giant jigsaw puzzle without a picture on the box to guide you....

October 23, 2025 • by Nele Dael in Brain Circuits
With organizations experiencing unprecedented levels of leadership burnout, Nele Dael identifies three ways to help your people integrate recovery into even the busiest schedule. ...

October 22, 2025 • by Ginka Toegel, Jean-Louis Barsoux in Brain Circuits
Following on from Part 1 of our series on “undiscussables”, here are ways to tackle team dynamics where people say but don’t mean, professing publicly to espouse values and attitudes that they...

October 21, 2025 • by Claudius A. Hildebrand in Brain Circuits
Many people new to leadership get into trouble by launching bold initiatives before they’ve won the necessary support to effect change. Follow these key practices to thrive in your new role. ...
Explore first person business intelligence from top minds curated for a global executive audience