As someone who was pursuing a cyber security degree but had to drop out (couldn't afford the financial costs; the program was too new at this university and was mismanaging classes), I'm looking forward to this series!
I do agree with Lenny's comment on the video feeling more like a podcast. I listen to podcasts so I didn't mind the format of the presentation (I was listening to the video in a background tab). Adding visuals would definitely help add to the experience.
One aspect of incidence response that I've found intriguing is transparency. You mentioned about whether there's a need to report to a data authority/law enforcement depending on the incident. What about the need to report to employees and/or customers that have been affected?
For example:
Canon publicly confirms August ransomware attack, data theft
It took Canon around 3 months to disclose a breach that involved current and former employees' (including their beneficiaries and dependents) names, Social Security number, date of birth, the number for the driver's license number or government-issued ID, the bank account number for direct deposits from Canon, and their electronic signature.
I know investigating incidents like this takes time, but the delay in notification puts people at risk. I'd imagine this is not solely up to the decision of the incident response team, but also involves the legal team (for potential litigation) and public relations (company's image) as well. How do companies prioritize disclosures like this?