IR 2.0 Framework · v0.1.0
DOCUMENT 02 / 05 · THE ROADMAP

Crawl,
Walk, Run.

A phased adoption path from insurable to proactive.

IR 2.0 is not an all-or-nothing program. This roadmap maps current posture to a three-stage progression — Crawl gets you insurable, Walk gets you resilient, Run gets you proactive. Each stage names its deliverables, transition points, and the metrics that prove it landed.

SeriesIR 2.0
Document02 of 05
Version0.1.0 · 2026
LicenseCC BY 4.0
02 / Crawl, Walk, Run
The Spectrum

Progress over perfection. Every step forward improves both resilience and insurability.

STAGE 01

Crawl

"Get defensible."
Timeline30 d (≤5 IT) · 14 d (6+)
SLA≤ 4 h assembly
Frequency≥ 1 drill / yr
STAGE 02

Walk

"Get resilient."
Timeline3 – 6 months
SLA≤ 1 h response
FrequencyQuarterly drills
STAGE 03

Run

"Get proactive."
Timeline6 – 12 months
SLA≤ 15 m auto-contain
FrequencyMonthly chaos

Start where you are. Use what you have. Do what you can. The roadmap exists so you can stop arguing about where to begin and begin somewhere that earns insurance, then resilience, then leverage.

IR 2.0 · Crawl, Walk, Run v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 02
02 / Crawl, Walk, Run
STAGE 01 / CRAWL

Get
defensible.

Establish the minimum viable IR program that supports cyber-insurance application conversations and other defensible-response audiences.
Timeline
30 d (≤5 IT) · 14 d (6+ IT)
SLA
≤ 4 h assembly

Deliverables

  • IR One-Pager. Incident definition, severity levels, roles (IC, Comms, Tech), escalation triggers, contacts.
  • The Big 3 controls. MFA on all critical systems · EDR on all endpoints · Tested immutable backups.
  • First tabletop drill. 60–90 minutes walking a ransomware scenario with key stakeholders.
  • Evidence collection. Screenshots, policy docs, restoration tests — your insurance application packet.

Quick wins

  • Download a cyber insurance application — every "No" answer is your next project.
  • Enable MFA on email, VPN, and admin accounts this week.
  • Schedule the first tabletop drill within 30 days.
  • Test one backup restoration and document the result.

Success metrics

MetricTarget
Insurance checklist completion≥ 70% "Yes" answers
Team assembly time≤ 4 hours
Tabletop drills completed≥ 1 per year
First blameless post-mortem completed✓ documented
IR 2.0 · Crawl, Walk, Run v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 03
02 / Crawl, Walk, Run
STAGE 02 / WALK

Get
resilient.

Move from a documented plan to a proven, practiced capability with initial automation.
Timeline
3 – 6 months
SLA
≤ 1 h response

Deliverables

  • Documented playbooks. At minimum: Ransomware, Phishing, Stolen Credentials, Data Exfiltration — each with steps, decision trees, comms templates.
  • SIEM deployment. Centralized logging, correlation rules for critical alerts, defined alert triage process.
  • First Calm Loop. One automated workflow: detection → enrichment → notification.
  • Quarterly drills. Rotated scenarios with documented lessons learned.
  • Reversibility Score policy. Defines which automated actions require human approval.

Key transitions

From "we have a plan" to "we've tested the plan."
From manual log review to automated alert correlation.
From improvised response to playbook-driven response.

Success metrics

MetricTarget
Mean Time to Detect (MTTD)≤ 24 hours
Mean Time to Respond (MTTR)≤ 1 hour
Playbook coverage≥ 80% of incident types
Tabletop drill frequencyQuarterly
Post-mortem completion rate≥ 80% of incidents
IR 2.0 · Crawl, Walk, Run v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 04
02 / Crawl, Walk, Run
STAGE 03 / RUN

Get
proactive.

Predictive operations with full Calm Loop automation and continuous improvement.
Timeline
6 – 12 months
SLA
≤ 15 m auto-contain

Deliverables

  • Full Calm Loop automation. End-to-end response for high-confidence scenarios; human gates for RS-3+.
  • AI-assisted triage. LLM-powered enrichment, initial analysis, recommended actions — human in the loop.
  • Chaos engineering. Scheduled live-fire drills. Inject failures to test recovery.
  • Threat intelligence integration. Proactive hunting, intel-driven playbook updates, preparation for emerging threats.
  • Continuous improvement loop. Every incident feeds playbooks, automation, and training. Blameless post-mortems standard.

Advanced capabilities

Predictive analytics for high-risk patterns. Cross-team automation across security, IT, and DevOps. Supply-chain incident playbooks. Cloud-native IR for containers, serverless, and multi-cloud.

Success metrics

MetricTarget
Mean Time to Contain (MTTC)≤ 15 minutes (automated)
Automation coverage≥ 70% of common incidents
False positive rate< 10%
Chaos drill frequencyMonthly
Post-mortem closure rate≥ 90% within 5 business days

This is staged operational work. Every loop iteration earns the next one.

IR 2.0 · Crawl, Walk, Run v0.1.0 · © 2026 Deretti Cyber Labs · CC BY 4.0 05