Detected: 06/02/2026, 14:23 CET — EDR alert on FS-BRU-03 flagged encryption activity on shared drive. SOC analyst confirmed ransomware signature (LockBit 3.0 variant) within 8 minutes.
Scope: 2 of 6 Brussels file servers affected. Approximately 12,000 files encrypted across Finance and HR shared drives. No evidence of lateral movement to domain controllers or backup infrastructure.
| Time | Recipient | Channel |
|---|---|---|
| 14:35 | CISO + IT Director | Phone call |
| 15:00 | Brussels site users | Email (pre-approved template) |
| 16:30 | Belgian DPA (GDPR notification) | Online portal |
Give IT security and operations teams a structured format for handling security incidents — from initial detection and triage through containment, eradication, and post-incident review. This template ensures every security event is documented, escalated correctly, and analysed to prevent recurrence.
Try now in EliumA security incident response template is a structured document for recording and managing security events — from detection through resolution and lessons learned. It defines the triage criteria, escalation paths, containment actions, and communication steps required to handle incidents consistently, regardless of severity or time of day.
Security incidents demand speed and precision. When a threat is detected, the team cannot afford to improvise. Without a standardised template, critical steps are missed under pressure, communication breaks down, and the post-incident review lacks the detail needed to prevent recurrence. A structured response template ensures every incident is handled with the same rigour, whether it is a phishing attempt or a ransomware attack.
This template is for teams responsible for information security:
The template has two parts: structured metadata fields and the incident response body.
Metadata fields classify each incident:
Incident response body documents the full lifecycle:
Decision Tree ready: This template also works as an Elium Decision Tree — instead of reading through a static document, guide your team through step-by-step questions that lead directly to the right answer. Learn more about Decision Trees.
Capture faster. Paste log extracts, alert notifications, and chat transcripts from the incident response into Elium’s AI. It organises the information into a structured timeline with detection, containment, and recovery phases — so the security team documents while responding, not after the fact.
Retrieve smarter. A SOC analyst asks Elium’s AI: “How did we handle the ransomware incident affecting the Brussels file servers last quarter?” The AI returns the containment steps, eradication procedure, and post-incident recommendations — so proven responses inform the current incident.
Security incidents generate critical knowledge — containment procedures that worked, escalation paths that failed, and root causes that need systemic fixes. When this knowledge is locked in ticketing systems or email threads, the next incident team starts from scratch. Elium makes incident knowledge reusable: structured templates capture the full response, search lets analysts find similar past incidents, and post-incident reviews become a living reference library.
VINCI Energies — 97,000 employees across 61 countries — uses Elium to centralise IT knowledge including incident procedures and response guides. Security teams across the organisation access consistent response procedures regardless of location.
Related reading: Read more on our blog
We use cookies to enhance your browsing experience, serve personalized content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy. Learn more in our Privacy Policy.
We use different types of cookies to optimize your experience on our website. You can choose which categories you want to allow.
These cookies are essential for the website to function properly. They enable basic functionality such as page navigation and access to secure areas. The website cannot function properly without these cookies.
These cookies help us understand how visitors interact with our website by collecting and reporting information anonymously. This helps us improve our website's performance.
These cookies are used to track visitors across websites. They are used to display ads that may be relevant and engaging for individual users.
These cookies enable enhanced functionality and personalization, such as videos and live chats. They may be set by us or by third-party providers.