Retained Incident Response
Expert incident responders on call 24/7/365, pre-agreed and ready to activate within an hour. Know who’ll be working your incident before it happens.
Why it matters
When an incident hits, the first hour matters more than any hour that follows. That hour determines whether you contain the threat or watch it spread. It determines whether you understand what happened or spend days reconstructing the timeline. It determines whether you keep the incident focused or watch it cascade across systems and teams. Most organisations discover incidents through alert overload, spotty detection or when customers report a problem. By then, the attacker has already moved.
The real challenge is not preparedness for known scenarios. Teams prepare. The real challenge is what happens when everything hits at once — when visibility fragments across tools, when decision-making stalls because you don’t know who to call, when communications collapse because you’re unsure what to say publicly. In that moment, clarity is the first thing you lose. Weeks are consumed by investigation because the team working your incident has never worked together. Technical decisions get made without legal context. Public statements get made without understanding the full scope. By the time you’ve formed the incident response team, the forensic window is closing.
Retained incident response changes that timeline. Instead of discovering incident responders during an incident, you have them already lined up. CREST-accredited experts are pre-agreed, onboarded and ready to activate with a single call. You know their names. You know their credentials. You’ve rehearsed the escalation path. The moment an incident is declared, you’re not forming a team — you’re activating one. Technical investigation, legal guidance and communications support move in parallel from hour one, not sequentially over days. This parallel response structure is what turns a crisis into a contained incident.
How it works
Step 1
Alert and escalate
Incident discovery comes from your monitoring, hunting or external notification. Your designated contact receives the initial call. Technical details go to the incident response team. This is intentionally simple — one call activates everything. No committee decisions. No second opinions needed. The escalation path is pre-defined and rehearsed.
Step 2
Stabilise and contain
Within the first hour, the incident response team connects with your internal stakeholders to understand what’s compromised, assess the business impact, and begin containment actions. Containment priorities are set together — if you’re a payment processor, availability matters more than forensic preservation. If you’re a regulated financial services firm, data protection and audit trails matter more than speed. The expert team shapes containment strategy around your specific context.
Step 3
Investigate and understand
Whilst containment is underway, forensic investigation begins in parallel. The responders identify where the attacker came from, how they moved through systems, what they accessed and what they left behind. Forensic findings feed continuous improvement — detecting evasion techniques your monitoring missed, identifying lateral movement patterns and determining scope of data exposure. Investigation continues throughout the incident lifecycle and informs recovery decisions.
Step 4
Manage communications and stakeholder coordination
Legal and communications teams work in parallel with technical responders. External notifications (to regulators, customers, law enforcement) are coordinated once you understand the full scope. Internal communications keep stakeholders informed without creating panic or second-guessing containment decisions. This parallel coordination means public statements are accurate and defensible because they’re built on complete forensic understanding.
Step 5
Recover with confidence
Once containment is stable and investigation is substantive, recovery begins. Systems are rebuilt from clean backups, patched and hardened based on what the incident revealed. Your team takes the handover — complete forensic findings, detection rules, architectural recommendations and monitoring configuration — and continues operations with confidence that the incident is truly contained.
Put experts on standby before an incident
Incidents come without warning. When they arrive, your team needs experts who know your environment, understand your business priorities and can activate immediately without contract negotiation. The first conversation sets up your retainer structure — defining who’s on call, how to reach them, what’s included in your response model, and what escalation looks like if you need additional resources. No emergency situations. No surprises about availability or cost. Just clarity about what happens when an incident occurs.

FAQs
What’s the difference between retained incident response and on-demand?
Retained incident response pre-agrees everything in advance. You know who’s on call, what they cost, what’s included in the retainer and how to escalate. When an incident happens, activation is a phone call. On-demand response means finding and contracting incident responders during an incident, which delays response by days and creates uncertainty about availability and cost. Retained response guarantees response time — most customers hear from an expert within 15 minutes. That speed matters because the first hour of containment prevents days of forensic investigation and recovery.
Can retained incident response work alongside our security operations team?
Yes. Retained incident response complements your security operations. Your SOC monitors for threats and detects incidents. When an incident is declared, the retained response team activates to handle investigation, containment and forensics while your team focuses on operational stability. The team working your incident has done this hundreds of times — their expertise is in incident response, not operational continuity. For most organisations, this hybrid model works better than expecting your SOC to handle everything because incident response and continuous monitoring require different skills and mindsets.
How are investigation findings and forensic evidence handled?
Investigation findings are yours. Forensic evidence is preserved according to legal and regulatory requirements — whether that’s for insurance claims, law enforcement involvement or internal audit. All findings, detection signatures and recommendations are documented and handed over to your team for ongoing implementation. If criminal prosecution is pursued, forensic evidence is maintained in proper chain of custody. If you’re responding to a regulatory requirement, documentation supports compliance. Investigation integrity is non-negotiable — evidence is handled, stored and reported to standards that support whatever actions you decide to take.
What if we need to scale response beyond the retainer?
Retainers define a service level — response time, expertise available, hours of engagement. If an incident is larger than retainer scope, we scale resources. Additional investigators, forensic specialists, legal support and communications resources are added as needed. Pricing for scaled response is agreed in advance so there’s no surprise about incremental costs. The retainer guarantees your baseline capability. Larger incidents don’t mean you’re waiting for availability — it means the team grows to match incident scope.
How often should we exercise our incident response plan?
Incident readiness improves with practice. We recommend at least annual simulations where your team walks through the incident response process, makes decisions under time pressure and tests escalation procedures. Simulations are valuable because they identify gaps before a real incident — unclear escalation authority, missing contact information, teams that haven’t worked together, decision points where you’re uncertain how to proceed. After a simulation, your team knows how retained response works and trusts the process. Real incidents then feel less chaotic because you’ve rehearsed the structure.






