CerulithBreach IRT T-72:00:00 Ransomware Response · May 2026 Defensibility0/9
Capstone Chain · M2Module 2 of 6

72 Hours

16:10 Friday. A clock starts that cannot be stopped.

Friday 8 May 2026, 16:10 (Dublin time). The statutory 72-hour clock under Art 33 is a machine. It does not care whether you have the full forensic picture. It does not care whether the CFO agrees. It runs from the moment you become reasonably aware that a personal-data breach has occurred.

Three decisions. One clock. Five hundred lives' worth of data on the line.

Learning Objectives
By the end of this module:
  • Apply the 'becoming aware' threshold under Art 33 + EDPB 9/2022 guidance.
  • Execute phased Art 33(4) notification under pressure without sacrificing defensibility.
  • Resolve the ransom-payment and Art 34 customer-notification calculus.
Incident 1Fri 8 May 2026 · 16:10Cerulith Ops Room

The Laptop

Ransom note reveal — CISO laptop
Imran Saleh
Imran Saleh · CISO
Three hours of anomalous database activity on the support plane. 420,000 records in scope. Export endpoint at eleven times baseline. Privileged service account — Quilltree's maintenance credential — active during a window we hadn't authorised.
Imran Saleh
Imran Saleh · CISO
I'd put exfil probability at 60%. Forensics will tell us properly by tomorrow morning. I wanted you to see it before I told Marcus.

You look at the clock. 16:10. DPC/IMI portal is open through the weekend. The 72-hour clock runs in real time, not business hours. Fran pings your phone. Marcus pings your phone. Imran hasn't left.

A Magecart-class actor compromised a third-party VPN credential at Quilltree Remote Access, a small Dublin-based contractor managing the support platform maintenance window. The same fact pattern that led to the Meta Ireland decision has repeatedly cost controllers nine-figure fines. The statutory clock starts at the moment you become aware. Imran's 60% confidence number is already enough.

SOC TriageFri 8 May · 16:15

Alerts — Last 24 Hours

12 alerts arrived in the last 24 hours. Sort each into In scope of breach / Out of scope / Needs more info. Your categorisation drives Imran's forensic prioritisation.

0 of 12 classified.
Decision 1 of 3Fri 8 May · 16:22

Becoming Aware

Fran is on your desk phone: "Let forensics finish. If we file and we were wrong, we've just told the market the platform is unsafe."

Marcus is on Teams: "Aisha — call it."

Question: When does the Art 33 clock start?

Consequence · +3 Defensibility

The Clock Runs

Dr Aisha Khan
Aisha · on exec call
EDPB Guidelines 9/2022 are clear. 'Becoming aware' is reasonable certainty that a security incident has occurred leading to personal data being compromised. We have that now. The Irish DPC's published breach-notification guidance reads the same way. Clock started at 16:10.
Fran Lloyd
Fran · CFO
And if Imran's 60% was wrong?
Dr Aisha Khan
Aisha
Then we file a follow-up under Art 33(4). Phased notification is permitted. We don't get to run the clock backwards.
Marcus Vale
Marcus · CEO
Go.

You've applied the Art 33 72-hour clock correctly against EDPB 9/2022 'becoming aware' and the EDPB 9/2022 codification.

You've also protected Cerulith's later defensibility — in BA and Marriott the DPC treated notification delay as an aggravating factor under Art 83(2)(a). Starting the clock timely is a mitigation that lives through the whole investigation.

Legal Insight
Why This Was Defensible
  • Art 33(1) — not later than 72 hours after becoming aware. Awareness is reasonable certainty, not forensic certainty.
  • Art 33(4) — where possible, information may be provided in phases. You can update.
  • H&M Hamburg €35.3M specifically criticised late scoping decisions.
Consequence · +1 Defensibility

The Internal Clock

Dr Aisha Khan
Aisha
Internal clock starts at 16:10. External engagement waits until Imran's Saturday 07:00 forensic update. We don't need to go silent — we need to go structured.

Legally tenable — Art 33(1) does not require immediate filing, only filing within 72 hours — but it narrows your margin. If Saturday's forensic window slips, or a new surprise adds to scope, you have less runway to file by Monday 16:10.

Legal Insight
Why This Is Mixed
  • Defensible, but risk-loaded. Experienced DPOs file early, update often.
  • The Art 33(4) phased provision is there to be used.
Consequence · −2 Defensibility

The Deferred Start

Fran Lloyd
Fran · CFO
Thank you.
Dr Aisha Khan
Aisha
I'm logging my disagreement in the DPO register.

Awareness under EDPB 9/2022 does not require forensic certainty. The 60% + the credential anomaly + the egress volume meet 'reasonable certainty.'

In Marriott the DPC accepted that full certainty is rare — delayed filing did not help the fine calculation.

Legal Insight
Why This Was Indefensible
  • Notification delay is an aggravating factor under Art 83(2)(a) (nature/gravity/duration) and (b) (intent/negligence).
  • The refusal becomes Exhibit A2 in Module 6.
BreatherSat 9 May · 07:04Aisha's kitchen

Saturday 07:04

Kitchen table · forensic report

Imran calls at 07:04. Forensics is closed. 428,302 records confirmed exfiltrated. Of which:

  • 39,241 contain Art 9 health data (blood pressure, adverse events, treatment logs).
  • 4,112 contain payment details (last 4 + expiry; CVVs never stored).
  • 14,802 EU-resident users (triggering Irish DPC lead-SA considerations).
  • 118 VIP users flagged under a previous customer-support escalation process — including one Paralympian on the Paralympic IE federation contract.

Clock at T-57h. High-risk to data subjects confirmed (Art 34 engages). DPC/IMI portal has a phased-submission option. Irish DPC has a parallel intake — lead-SA routing means one lead with concerned authorities, not two duplicate filings.

Decision 2 of 3Sat 9 May · 08:12

The DPC Portal

Imran's report is drafted. Categories are clear. Numbers will firm up but are unlikely to grow materially. Fran has calmed. Marcus is ready.

Question: How do you notify the ICO?

Consequence · +3 Defensibility

The Phased Filing

Hand on trackpad · DPC/IMI portal
Dr Aisha Khan
Aisha · filing
Phased submission, Saturday 08:12. Notification sent. Update commit for Tuesday 12:00.
Imran Saleh
Imran · on call
I'll have a confirmed number by Monday noon. Root-cause draft by Tuesday 10am.

Art 33(4) phased notification is the path regulators expect for fast-moving incidents. The DPC has stated publicly (post-BA and post-Capita) that they would rather receive an honest initial notification they can update, than a late 'complete' one.

Legal Insight
Why This Was Defensible
  • Art 33(4) — phased notification is explicit and commonly used.
  • Amazon €746M and the broader EU enforcement line treat phased, early filing as mitigating — late "complete" filing is the aggravator.
  • BA and Marriott both treated early, transparent notification as mitigating.
Consequence · +1 Defensibility

The Minimal Filing

You've filed on time — good — but withholding category/number estimates when you have them fails Art 33(3)(a)/(b). The Article expects 'approximate numbers' and 'categories and approximate numbers of records' where possible. The DPC will treat this as substantively incomplete and open an information-notice thread early.

Legal Insight
Why This Is Mixed
  • Procedurally on-time. Substantively thin.
  • Better than delay. Worse than phased-with-ranges.
Consequence · −2 Defensibility

The Monday Deadline

Filing close to the deadline with a 'complete' report is a pattern criticised in every DPC decision on breach notification in the last five years.

Even if the filing is technically within 72 hours, the DPC reads the choice as prioritising presentation over transparency. Aggravating under Art 83(2)(b) (intent/negligence) and (f) (cooperation).

Legal Insight
Why This Was Indefensible
BreatherSun 10 May · 22:15

Sunday 22:15

Ransom note received via a contact-us form address. $2.4M in BTC. 48-hour publish threat. Attackers name: Quilldark.

Fran's position hardens: "Pay it. Containment. No public notification. Attackers go away, we rebuild, board never hears about it."

You check OFSI / OFAC guidance. Quilldark is a known cluster — no current sanctions listing, but one allied cluster was listed in March 2026. Clock at T-18h. Art 34 is engaged — the question is how.

Decision 3 of 3Sun 10 May · 23:40

The Call Home

By tomorrow 16:10 you owe Marcus a board-briefed decision. Three postures. One the CFO wants. One the DPC expects. One is the compromise that looks sensible until someone is hospitalised.

Question: How do you handle the ransom and Art 34 notification?

Consequence · +3 Defensibility

The Notification

Campaign dashboard · SCHEDULED → SENT
Dr Aisha Khan
Aisha · to Marcus
428,302 notifications scheduled for 09:00. Segmented by data category affected. Special-category holders receive the longer version with clinician guidance. We've paid nothing.
Marcus Vale
Marcus · CEO
Fran?
Fran Lloyd
Fran · CFO
I still disagree on the payment. I accept I'm outvoted.

Art 34 requires clear, plain-language communication 'without undue delay' where the breach is likely to result in a high risk. Health data with exfiltration confirmation is high risk by default. Refusing the ransom aligns with UK NCSC-IE + ENISA published guidance and preserves a cleaner regulatory posture.

Legal Insight
Why This Was Defensible
  • Art 34(2) requires specific information — nature, likely consequences, measures — in plain language.
  • Art 32 appropriate measures post-incident: credential rotation, monitoring, hardening.
  • Cooperation with NCSC-IE + ENISA is cited as mitigating in BA.
Consequence · +1 Defensibility

The Generic Email

A generic notification meets the technical Art 34 duty but falls short of 'plain language' and specific-consequences requirements for Art 9 health data exfiltration. The DPC has criticised generic notifications in Capita — customers who didn't know their health data specifically was affected could not take informed steps.

Legal Insight
Why This Is Mixed
  • Art 34(2) requires description of likely consequences, not platitudes.
  • A generic notice invites complaints; complaints invite broader investigation.
Consequence · −2 Defensibility

The Quiet Payment

Non-notification is an Art 34 breach. 'Likely to result in high risk' is a legal test, not a business-risk test; exfil of Art 9 data on 428,302 people meets it.

When the payment becomes public — as it did in Uber 2018, and in every comparable case — the investigation widens. This decision becomes Exhibit B in Module 6, and moves the fine tier from Art 83(4) to Art 83(5).

Legal Insight
Why This Was Indefensible
  • Art 34 is not subject to a business-risk exception.
  • Art 83(2)(f) cooperation collapses once the payment becomes known.
Computing

Computing Defensibility…

Summing the three decision impacts.

Weekend That Held

The Weekend That Held

No ransom. Tailored Art 34. ICO cooperative.

Affected · Data subjects
The 428,302 notified users had a specific, useful communication in their inbox by Monday 10:00. The helpline took 9,200 calls in the first 72 hours. Three VIP users reply with measured thanks. No secondary-fraud spike.
Company · Cerulith
Total incident cost: €3.3M. No ransom paid. DPC investigation notice follows but remains at the cooperative end of the spectrum.
Career · Aisha
Aisha's weekend log and register entry become the model for the DPO handbook chapter on 'Phased Art 33 filing under time pressure.' Imran co-authors it.
Next 50 incidents
The credential-rotation policy and Quilltree contract are rewritten. Six other subcontractors lose persistent VPN access.
System · Industry
DPC's post-incident review cites Cerulith as an example of phased filing done correctly. The anonymised summary appears in a DPPA webinar that autumn.
Weekend That Almost Held

The Weekend That Almost Held

Technically correct. Substantively thin.

Affected · Data subjects
Users receive a generic notification. 4,200 phishing attempts follow in the next fortnight targeting the breach cohort; 118 users report successful fraud.
Company · Cerulith
Total incident cost: €4.6M. DPC investigation notice arrives in June with three information requests.
Career · Aisha
Aisha's filing is technically correct, substantively thin — a lesson she takes into M3.
Next 50 incidents
Credential rotation done. Comms playbook updated.
System · Industry
The thin Art 34 notification is later cited in one MPN reference as a 'pattern indicator.'
Payment That Got Out

The Payment That Got Out

OFSI referral. 4% tier. Fran departs.

Affected · Data subjects
The payment is discovered via an OFSI referral in August 2026. 428,302 users learn about the breach via a BBC News leak. Two users with adverse-event history report targeted phishing leading to temporary loss of medication supply.
Company · Cerulith
Total incident cost: €36M by FY27 close. Linchpin of the MPN in Module 6 — moves Cerulith from the 2% tier to Art 83(5) 4%. Balderton imposes board-level governance changes; Fran departs in October.
Career · Aisha
Aisha's DPO independence is formally invoked. Vikram's memo becomes the principal defence. Aisha is not dismissed — she is the reason Cerulith has any defence at all.
Next 50 incidents
Every customer communication for 24 months is rewritten from scratch under external counsel.
System · Industry
The ransom payment, non-notification, and scope-deferral sit in the interview binder Máire brings to Cerulith on 19 January 2027.
Debrief

What M2 Teaches

Key Points
Five things to keep
  • Awareness is reasonable certainty, not forensic certainty. The clock does not care about weekend hours.
  • Art 33(4) phased notification is the professional path. File early, update often.
  • Art 34 requires specific plain-language communication on likely consequences — especially where Art 9 data is involved.
  • Quiet ransom payment moves the fine tier from controller-duties (2%) to data-subject-rights (4%) and forfeits cooperation mitigation.
  • Every choice taken under pressure becomes an exhibit in the investigation binder.

Next module: Two months from now, Priya Shah will demo Cerulith Clinic AI. Art 9 health data with automated triage. You will have six weeks to build a DPIA that Marcus does not want to hear about.

Knowledge Check

5 Questions

Five questions on Art 32-34, EDPB breach guidance, and the awareness threshold. Pass mark: 80%.

Module Complete

Module 2 Complete

Defensibility score: / 9

Quiz:

Outcome:

Your result has been recorded. Module 3 unlocked: Priya's DPIA.