Download our detailed workflow on creating a cyber incident response playbook
There is little room for error during a cyber-attack and your staff, technical and managerial, must have access to easy-to-follow actions during and after an attack to ensure that your organisation comes out unscathed. Atul Gawande puts it brilliantly in his book, The Checklist Manifesto: How To Get Things Right...
"Avoidable failures are common and persistent, not to mention demoralizing and frustrating, across many fields—from medicine to finance, business to government. And the reason is increasingly evident: the volume and complexity of what we know has exceeded our individual ability to deliver its benefits correctly, safely, or reliably. Knowledge has both saved us and burdened us."
This workflow, taken from our GCHQ-Certified Cyber Incident Planning and Response course, shares the basics that you need to know about creating a cyber incident response playbook.GDPR & Privacy ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.
We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop
Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations
We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.
Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements
With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.
We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response