NZ Incident Response Bulletin – May 2025

Evolving Incident Response – Key Updates from NIST SP 800-61r3

Overview
The National Institute of Standards and Technology (NIST) has released a significant update to its guidance on cybersecurity incident response. The transition from SP 800-61 Revision 2 (2012) to SP 800-61 Revision 3 (April 2025) reflects a strategic evolution, moving away from a reactive posture and toward integration with NIST Cybersecurity Framework (CSF) 2.0. This shift acknowledges the increasing complexity and persistence of cyber threats and underscores the need for response strategies to be embedded within an organisation’s broader risk management practices.

Why It Matters for New Zealand Organisations
In recent years, several high-profile cyber incidents across New Zealand have highlighted critical gaps in incident readiness and response agility. These events demonstrated how delays in detection, unclear escalation paths, and fragmented stakeholder communication can lead to prolonged disruption and reputational damage. Conversely, other organisations that had mature incident response plans – including playbooks aligned to risk tiers, executive visibility, and pre-established coordination with legal and communications teams – were able to limit the impact, reduce downtime, and maintain public trust.

No one industry is immune from cyber-attacks, although we see professional services as lagging behind in cyber incident preparedness given, they amongst the highest targeted. The adoption of structured and up-to-date incident response practices is essential to national cyber resilience. The updates in SP 800-61r3 offer a timely opportunity for New Zealand organisations to reassess their preparedness and align with global best practices.

Key Enhancements in SP 800-61r3

  • CSF 2.0 Alignment:
    Incident response is mapped to the six CSF 2.0 Functions – Govern, Identify, Protect, Detect, Respond, and Recover – promoting a lifecycle approach that incorporates governance and strategic risk management.
  • Focus on Continuous Improvement:
    The guidance stresses the importance of learning from every incident, embedding insights into planning, training, and control updates.
  • Broadened Stakeholder Involvement:
    Successful incident response is shown to depend on inclusive coordination across executive leadership, legal, HR, IT, and external partners.
  • Dynamic Resources:
    SP 800-61r3 points organisations to online tools like the Cybersecurity and Privacy Reference Tool (CPRT) for evolving guidance in real-time.

Evaluate Incident Response Maturity

NIST SP 800-61r3 presents a forward-thinking framework that moves incident response from a reactive function to a core component of strategic risk management. We recommend New Zealand organisations review this guidance to help build resilience, minimise disruption, and ensure coordinated, effective responses in an increasingly hostile cyber threat environment. The follow are three essential steps to being with:

Benchmark: Begin by benchmarking your organisation’s existing incident response (IR) capabilities against an established framework. Focus not only on technical capabilities but also on governance, roles, escalation paths, and decision-making processes. Pay close attention to areas such as threat detection, response coordination, and executive oversight. Prioritise improvements in domains where there is limited visibility, unclear accountability, or inconsistent documentation. This assessment should also consider third-party and supply chain dependencies, which are increasingly common vectors in major breaches.

Simulate and Train: Conduct regular, realistic tabletop exercises that bring together executives, operational teams, legal, communications, and relevant third parties. Scenarios should reflect the types of incidents most relevant to your organisation’s risk profile – such as ransomware, data breaches, or cloud service compromise. Ensure exercises test both technical containment procedures and business continuity impacts. These simulations should be reviewed post-exercise with formal after-action reports, highlighting gaps, miscommunications, or areas where decisions were delayed or unclear.

Institutionalise Post-Incident Learning: Establish a structured post-incident review process that activates after every incident – regardless of severity. Ensure the process captures technical findings, response timelines, coordination issues, and decision points. Engage all stakeholders involved, from security teams to executive sponsors, to review outcomes and agree on follow-up actions. Lessons learned should directly inform updates to IR playbooks, awareness training, system configurations, and business continuity plans. Embedding this feedback loop ensures continuous improvement and resilience-building over time.

About the Bulletin:

The NZ Incident Response Bulletin is a monthly high-level executive summary containing some of the most important news articles that have been published on Forensic and Cyber Security matters during the last month. Also included are articles written by Incident Response Solutions, covering topical matters. Each article contains a brief summary and if possible, includes a linked reference on the web for detailed information. The purpose of this resource is to assist Executives in keeping up to date from a high-level perspective with a sample of the latest Forensic and Cyber Security news.

To subscribe or to submit a contribution for an upcoming Bulletin, please either visit https://incidentresponse.co.nz/bulletin or send an email to bulletin@incidentresponse.co.nz with the subject line either “Subscribe”, “Unsubscribe”, or if you think there is something worth reporting, “Contribution”, along with the Webpage or URL in the contents. Access our Privacy Policy.

This Bulletin is prepared for general guidance and does not constitute formal advice. This information should not be relied on without obtaining specific formal advice. We do not make any representation as to the accuracy or completeness of the information contained within this Bulletin. Incident Response Solutions Limited does not accept any liability, responsibility or duty of care for any consequences of you or anyone else acting, or refraining to act, when relying on the information contained in this Bulletin or for any decision based on it.