1) The document outlines five steps to take when an organization experiences a "Zero Hour", which is when sensitive data is at risk due to a security breach or hack. The five steps are: understand your data and where it is stored; evaluate and update data security policies; plan your data breach response; check cyber liability insurance coverage; and assess information security representations to clients. 2) It stresses the importance of understanding what sensitive data an organization has, where it is located, and having updated security policies. It also recommends planning an internal response team and external partners to contact in the event of a breach. 3) Organizations should also check what cybersecurity incidents their insurance policies cover and ensure security claims to clients