Your organisation just bought an incident response retainer. You feel protected. You have a contract that promises 24/7 support and rapid response times.
Then ransomware hits at 2 AM on a Saturday.
You call the hotline. After 20 minutes on hold, a junior analyst answers. They're offshore, unfamiliar with UK regulatory requirements, and need to "escalate to the UK team" who won't be available until Monday. Your SLA says "4-hour response" but it turns out that means "we'll acknowledge your call within 4 hours" — not "we'll have boots on the ground."
This isn't a hypothetical. We've seen it happen to organisations that thought they were protected.
The difference between a retainer that protects you and one that fails you isn't price — it's asking the right questions before you sign. This guide covers the 12 questions that separate competent IR providers from expensive disappointments.
Why an IR Retainer Matters
Before diving into the questions, let's be clear about what's at stake.
The Cost of Not Having One
When an incident occurs without a retainer in place:
- You're competing for attention. IR providers prioritise retainer clients. Non-retainer clients go to the back of the queue — sometimes waiting days for engagement.
- You're paying emergency rates. Emergency IR engagements typically cost 2-3x standard rates. A £15,000 retainer can save £50,000+ in emergency fees.
- You're starting from zero. With no prior relationship, the IR team knows nothing about your environment, your business criticality, or your regulatory obligations.
- You're negotiating contracts under pressure. Reading through terms and conditions while your systems are encrypted is not a good position.
Cyber Insurance Implications
Most cyber insurance policies now require — or strongly incentivise — having an IR retainer in place. This isn't just a checkbox:
- Policies may specify approved panel providers
- Claims can be delayed or reduced if you engage non-approved providers
- Premiums are often lower with a retainer in place
- Some policies won't cover IR costs at all without pre-approval
Before selecting an IR provider, check your cyber insurance policy requirements. Your insurer may have a preferred panel, or they may allow you to pre-approve a provider of your choice.
The 4 Types of Retainer Structures
Not all retainers are structured the same way. Understanding the model matters because it affects what you're actually buying.
| Type | How It Works | Pros | Cons |
|---|---|---|---|
| Hours-banked | You pre-purchase a block of hours (e.g., 40 hours/year) at a discounted rate. Hours are drawn down during incidents. | Clear cost control. Discounted hourly rate. | Hours may not cover a serious incident. May expire unused. |
| Subscription | Fixed monthly/annual fee for access to IR services. May include unlimited hours or capped incidents. | Predictable costs. No worry about running out of hours. | May pay for services you never use. Read the fine print on exclusions. |
| Hybrid | Base retainer fee for priority access and pre-incident services, plus hourly rates for actual incidents (often discounted). | Balances access with usage-based costs. Often includes proactive services. | Incident costs can still be significant. |
| Insurance-backed | IR services provided through your cyber insurance policy. Insurer pays directly. | Covered by insurance. May be "free" to you. | Limited provider choice. May affect claims. Provider serves insurer's interests. |
The 12 Questions You Must Ask
These are the questions that reveal whether an IR provider will actually deliver when you need them. For each question, I've included what a good answer looks like — and the red flags that should make you walk away.
Question 1: What is your average response mobilisation time?
This is different from "response time" in your SLA. Mobilisation time means: from the moment you call, how long until a qualified analyst is actively working on your incident?
Question 2: Do you have a 24/7 UK operations centre, or do calls go offshore?
This matters for regulatory knowledge, legal privilege, and simple communication during a crisis. Offshore call centres can handle initial triage, but UK-specific incidents need UK expertise.
Question 3: What does "retainer hours" actually cover?
Some providers use retainer hours only for hands-on-keyboard work. Others include scoping calls, legal coordination, evidence packaging, and report writing. The difference can be 2x the hours consumed for the same incident.
Question 4: Do unused hours roll over, and what happens to them at renewal?
If you're buying hours-banked, you need to know what happens if you don't use them. Some providers let hours roll over indefinitely. Others expire them and pocket the difference.
Question 5: Who specifically will respond — named individuals or anonymous analysts?
During a crisis, you want to know who's leading your response. Some providers guarantee named senior practitioners. Others send whoever's available from a pool.
Question 6: What forensic tools do you deploy?
Some providers rely entirely on your existing EDR. Others bring their own tooling that can work independently or fill gaps in your coverage.
Question 7: Do you handle ransomware negotiations directly or outsource?
Ransomware negotiation is a specialist skill. Some IR providers handle it in-house. Others outsource to third parties — adding another layer of coordination and cost.
Read more about what makes effective ransomware negotiation.
Question 8: Can you interface with our insurer and legal team simultaneously?
Incident response doesn't happen in a vacuum. Your IR provider needs to coordinate with insurance claims adjusters, external legal counsel, internal legal, and potentially regulators — often all at once.
Question 9: Do you maintain a current threat intelligence capability, or just reactive IR?
The best IR providers don't just respond to incidents — they understand the threat landscape. This makes them faster at attribution, more accurate in scoping, and better at predicting attacker behaviour.
Question 10: What evidence preservation methodology do you follow?
Evidence must be collected and preserved in a way that's admissible in court, acceptable to insurers, and compliant with regulatory requirements. Sloppy evidence handling can invalidate insurance claims and undermine legal proceedings.
Question 11: Are you familiar with the ICO 72-hour notification requirement, and how do you support it?
UK GDPR requires notification to the ICO within 72 hours of becoming aware of a personal data breach. Your IR provider should understand this timeline and be able to support your notification decision.
Question 12: What does your post-incident reporting look like, and how do we use it?
The final report matters more than most organisations realise. It's used for insurance claims, regulatory inquiries, board reporting, and preventing future incidents. A good report is comprehensive but actionable.
Red Flags: When to Walk Away
Beyond the 12 questions, watch for these warning signs during the sales process:
Walk away if:
- They can't provide references from similar incidents. An IR provider who can't share anonymised case studies or arrange reference calls has something to hide.
- The sales team can't answer technical questions. If they need to "get back to you" on basic questions, imagine how responsive they'll be during a crisis.
- Their SLA has excessive carve-outs. Watch for terms like "best efforts," "subject to availability," or "excluding force majeure." These give them escape routes.
- They require long minimum engagements for incidents. Some providers mandate minimum 40-hour engagements regardless of incident size. This protects them, not you.
- They won't do a scoping call to understand your environment. A provider who doesn't want to know about your business before signing isn't planning to tailor their response.
- They claim to "handle everything" with no specialisations. IR, forensics, negotiation, legal, PR — no single firm does everything well. The best providers are clear about their capabilities and have established partnerships for what they don't do.
- They're vague about who actually does the work. "Our team of experienced analysts" could mean anything. Push for specifics on qualifications and experience levels.
What Good IR Retainer Engagement Looks Like
Here's what you should expect from a proper IR retainer relationship, from signing to activation.
Onboarding (First 30 Days)
- Kick-off call to understand your environment, crown jewels, and critical systems
- Documentation of escalation contacts and decision-making authority
- Exchange of secure communication channels (encrypted messaging, out-of-band email)
- Review of your cyber insurance policy requirements
- Optional: baseline assessment or tabletop exercise to test readiness
Ongoing Relationship
- Quarterly check-ins to update contact information and environment changes
- Threat briefings relevant to your industry
- Access to pre-incident services (tabletop exercises, security assessments)
- Annual retainer review and renewal discussion
Incident Activation
- Single phone call to activate response
- Named responder engagement within agreed SLA
- Clear handoff to incident lead within first hour
- Regular status updates at agreed intervals
- Coordination with your stakeholders as needed
Case Study: What a Working Retainer Looks Like
Organisation: Mid-sized UK manufacturing company (450 employees, £85M revenue)
Retainer type: Hybrid retainer with 40 pre-purchased hours, discounted incident rates, and proactive services
The incident: Ransomware attack discovered at 6:47 PM on a Friday. Production systems encrypted. Ransom demand: £1.8M.
Response timeline:
- 6:52 PM: IT Director calls retainer hotline
- 6:54 PM: Speaking with named primary responder (who already knew their environment)
- 7:15 PM: Remote forensic collection initiated on priority systems
- 7:45 PM: Initial triage complete, containment strategy confirmed
- 8:30 PM: Board briefed via pre-established crisis call
- Saturday 9:00 AM: Full forensic analysis underway, negotiation initiated
- Day 3: ICO notification submitted with impact assessment
- Day 7: Negotiated settlement at £340,000 (81% reduction)
- Day 12: Full production restored from clean backups
How to Compare Providers
Once you've asked the 12 questions to multiple providers, use this framework to compare:
| Factor | Weight | What to Compare |
|---|---|---|
| Mobilisation speed | High | Actual mobilisation time (not SLA acknowledgement time) |
| UK capability | High | 24/7 UK-based response, regulatory knowledge |
| Ransomware expertise | High | In-house negotiation, group-specific intelligence |
| Insurance compatibility | High | Panel status, pre-approval with your insurer |
| Evidence standards | Medium | ISO compliance, chain of custody, court admissibility |
| Proactive services | Medium | Tabletop exercises, assessments, threat briefings included |
| Retainer structure | Medium | Hour rollover, what's included, overage rates |
| Price | Low | Total cost of ownership, not just annual fee |
Making Your Decision
An IR retainer is insurance you hope never to use — but when you need it, nothing else matters. The organisations that recover fastest from cyber incidents aren't necessarily the ones with the biggest security teams or the most advanced tools. They're the ones who established the right partnerships before the crisis.
Take the time to ask these 12 questions. Meet your potential responders. Run a tabletop exercise with them. The hour you invest now saves days during an actual incident.
Ready to Discuss an IR Retainer?
Binary Response offers IR retainer packages for UK organisations of all sizes. Our retainers include named responders, 24/7 UK-based support, in-house ransomware negotiation, and proactive services.