NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
February 6, 2025

The Five Stages of a Breach: A CISO’s Journey Through Grief

Jack Danahy Jack Danahy

Cybersecurity incidents are more than just technical failures—they disrupt operations, erode trust, and demand fast, strategic responses to contain damage and recover effectively. The emotional toll of a breach often mirrors the five stages of grief—denial, anger, bargaining, depression, and acceptance.

Elisabeth Kübler-Ross first introduced these stages in her work on grief, and their relevance to cybersecurity became clear as I reviewed recent breach reports. Time and again, I saw security leaders experiencing these same emotions. Recognizing this pattern can help organizations respond more effectively, reduce impact, and emerge stronger in the face of inevitable cyber threats. 

1. Denial: "This can’t be happening"

At first, there’s disbelief. Maybe the logs are wrong. Maybe the alert is a false positive. Surely, the security measures in place would have prevented this.

But as the reality of encrypted files or leaked data sets in, denial quickly fades. The sooner organizations accept the breach as real, the sooner they can take meaningful action. With cyberattacks on the rise—Check Point Research reported a 30% year-over-year increase in attacks in Q2 2024, reaching an average of 1,636 attacks per organization per week—many organizations still underestimate their own vulnerability, despite the overwhelming evidence that breaches are becoming more frequent and severe.

2. Anger: "Who’s responsible for this?"

Next comes the search for blame. It might be an employee who clicked a phishing link, an unpatched system, or a misconfigured firewall. Tempers flare as teams look for a scapegoat.

But pointing fingers doesn’t fix the problem. While accountability matters, spending too much time looking for culprits delays critical response efforts. It’s noteworthy that 88% of cybersecurity breaches are caused by human error, highlighting the critical need for comprehensive training and awareness programs within organizations.

3. Bargaining: "Maybe it’s not that bad"

At this stage, hope creeps in. Maybe the attackers only got trivial data. Maybe backups are still viable. Maybe paying the ransom will bring back the files without consequence.

But hoping for a best-case scenario isn’t a strategy. Alarmingly, more than 77% of organizations do not have an incident response plan, leaving them unprepared to handle a breach effectively. Without a structured plan, response efforts become chaotic, recovery takes longer, and the financial and reputational impact deepens. Attackers rarely operate in good faith, and relying on their promises is a gamble with high stakes.

4. Depression: "This is a disaster"

When the full scope of the breach is understood, a wave of hopelessness often follows. The remediation process is daunting: incident response calls, regulatory scrutiny, customer notifications, and reputational fallout. Security teams feel exhausted and disheartened.

Beyond financial losses, breaches can have profound psychological effects. Victims often experience emotional distress, including feelings of anger, betrayal, and helplessness, which can lead to long-term mental health challenges. But this moment of despair is also a turning point.

5. Acceptance: "Here’s what we do next"

The organizations that recover best from breaches are the ones that reach acceptance quickly. Instead of lingering in blame or false hope, they take decisive action: clear disclosures, rapid notifications, and well-communicated remediation plans.

In today’s world, breaches are increasingly common—research from Splunk found that 90% of organizations faced at least one disruptive cyberattack in the past year, underscoring the pervasive nature of these threats. What sets companies apart is how they respond. The public, customers, and regulators are watching. Acceptance and responsibility are now the ultimate measures of a company’s credibility.

Moving forward with resilience

Organizations can shorten the emotional turmoil of a breach by planning ahead. A strong incident response plan, clear communication strategies, and a culture of accountability—not blame—help teams move past the first four stages faster.

Just as in healthcare, prevention and preparedness are key. Regular security check-ups, proactive risk management, and continuous improvement can reduce the impact of future breaches. And when incidents do occur, swift and responsible action makes all the difference.

Cybersecurity isn’t just about preventing attacks—it’s about managing them with intelligence, responsibility, and speed. The best security leaders don’t waste time in denial or anger; they move forward with clarity and confidence.

Is your organization prepared for the inevitable? NuHarbor Security helps you strengthen your defenses and build long-term resilience. Let’s talk about how we can support your security strategy.

Don't miss another article. Subscribe to our blog today. 

Subscribe now
Jack Danahy
Jack Danahy

Jack (he/him) is the Vice President of Strategy & Strategic Services at NuHarbor Security where he spearheads the research and development of the unified security service platform, striving to simplify cybersecurity for all organizations. Prior to joining NuHarbor Security, Jack founded three successful security software companies that were acquired by Watchguard Technologies, IBM, and Alert Logic, and has received 12 patents for his security innovations. Jack is a sought-after cybersecurity speaker and writer; his insights and opinions have been featured in prestigious publications such as Forbes, Fortune, the New York Times, and the Washington Post, solidifying his influence and expertise.

Related Posts

Industry Insights 2 min read
Chevron Doctrine’s Fall: The Catalyst Cybersecurity Needed?
Read More
Threat Intelligence 3 min read
Threat Hunting Basics: The Hunted Becomes the Hunter Read More
Industry Insights 12 min read
The First 101 Days as a New Chief Information Security Officer: A CISO Roadmap Playbook
Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.