Response Plans
Deepfake Incident (0-24 hours)
Hour 0-2: Contain
- Document everything
- Alert security team
- Preserve evidence
Hour 2-6: Assess
- Identify deepfake type
- Determine scope
- Assess damage
Hour 6-24: Respond
- Submit takedowns
- Contact platforms
- Issue statements
Prompt Injection Incident
Immediate (0-1 hour)
- Isolate systems
- Review logs
- Identify compromise
Short-term (1-24 hours)
- Patch vulnerabilities
- Reset credentials
- Notify users