Cyber Security Blog

Like many industries, the supply chain sector is in the midst of a digital transformation — from automation of tasks to the Internet of Things streamlining operations. However,...
22 April 2021
Aster Housing regularly conducts annual cybersecurity audits. However, this time around, it chose to host a Cyber Crisis Tabletop Exercise with Cyber Management Alliance...
20 April 2021
Cyber tabletop exercises are the flavour of the season in the world of IT security. The COVID-19 pandemic has exposed vulnerabilities in the security infrastructure of...
15 April 2021
The Monetary Authority of Singapore (MAS) has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial...
13 April 2021
Who should read this?  Anybody and everybody interested in managing privileged users, anyone looking to buy a PAM solution or anyone looking to renew their existing Privileged...
31 March 2021
Cyber Management Alliance has recently added some of the world's most prestigious organisations including Google, Formula One, Sony, BAE Systems, Citibank, AstraZeneca,...
31 March 2021
In the pandemic-stricken global scenario, we are constantly being alerted to the rising dangers and looming threats of cyber-crime. What the easyJet cyber-attack teaches us,...
30 March 2021
Bharti Airtel, India's 2nd largest telecommunications company with operations in 18 countries across Asia and Africa, recently organised an exclusive private internal CIPR...
25 March 2021
Over 270 staff members of the NHS attended CM-Alliance’s flagship, NCSC-Certified Cyber Incident Planning and Response training, over a course of three months. 
16 March 2021
Recently, 15 local councils of Essex County underwent the NCSC-certified training to bolster their overall security posture by raising staff awareness and refreshing their...
9 March 2021
It is often assumed that cybersecurity training and awareness is a matter of concern for only large businesses and enterprises as they are more vulnerable to threats and have...
29 October 2020
Organisations that are reviewing their cyber incident response plans or even those that are looking to improve their cybersecurity maturity need to focus on identifying their...
27 October 2020
How customer/citizen data is processed and used is a highly regulated subject in many parts of the world. The GDPR is perhaps the most prominent and well-known example of data...
22 October 2020
There is no such thing as an "unhackable" system. In general, cybersecurity can be described as ensuring that there is no unauthorised access to an enterprise’s network, to...
13 October 2020
The Travelex cyber-attack  (just like many others) contains overwhelming lessons about cyber incident response and cyber crisis management for those who wish to seek them out....
7 October 2020
The ultimate goal of any cybersecurity endeavour or cybersecurity training programme is to thwart an attack and emphasize on the need for training people and systems to...
16 September 2020
You’re aware that without a cyber incident response plan you’re exposing your business to incomparable risk. You also know that these response plans are reliable only if you...
15 September 2020
Every business needs a fit-for-purpose cyber incident response plan to enable them to rapidly and effectively respond to a cyber-attack. This blog provides ideas on how you can...
10 September 2020
In this article, we discuss combining Nmap and Metasploit together to perform port scanning and enumerate for vulnerabilities.
8 September 2020
If you’re a smart business owner or executive, you already know that you should peg your security infrastructure and the safety of sensitive data as top priorities. To ensure...
8 September 2020
A successful cyber-attack can be the downfall of any well-positioned business. Data breaches not only cause significant financial losses but are also the leading cause of a bad...
4 September 2020
Project Management & Cybersecurity Training have become inextricably linked today. Successfully planning and executing a business/IT project for a client is almost impossible...
4 September 2020
Artificial Intelligence (AI) and Machine Learning (ML) have become the kind of buzzwords that are used so often, it’s fair to say that they are almost abused. They are usually...
1 September 2020
Amar Singh, Founder & CEO of CM-Alliance and Patrick Bayle, Senior Systems Engineer at Cortex (a Palo Alto Networks company) delve into how Cortex’s XSOAR can automate 95% of...
6 August 2020
Cyber threats loom large today. So, have you wondered what actually happens during a cyber-attack? Can cybersecurity training and specifically incident response training help...
22 July 2020
There is a vast array of threat intelligence data out there and a variety of platforms that help businesses collect such insights. But is this data contextual, consumable,...
14 July 2020
We discuss cybersecurity training for non-IT and non-technical business executives in this blog. As a bare minimum, these professionals must have a working knowledge of cyber...
7 July 2020
Selecting the right type of cyber incident response training has never been this important.  No organisation today is exempt from being vulnerable to cyber-attacks, which makes...
18 June 2020
You can never be too prepared when it comes to cybersecurity and data privacy. For the health of your business, it is essential to continuously test your cyber incident...
15 June 2020
In any discussion on cyber incident response & resilience, it is imperative to deliberate upon the subject of threat actors. After all, if you can’t identify who could...
27 May 2020
We reviewed SAMA, QCB & NESA Regulations on Business Continuity Planning, Testing & Cyber tabletop exercises and created an easy reference for you. We will be updating this...
24 May 2020
We have created an optimised cyber incident response plan template for you to download along with some guidance on how to fill it in and how to make it personal to your...
22 May 2020
To discuss cyber incident response with the CEO, you must be familiar with ISO 27001, NIST's CSF, PCI-DSS NCSC'S Cyber Assessment Framework and other regulations and standards...
11 May 2020
Cyber incident response training is an important investment for today's business leaders. It's crucial that executive and management professionals throughout the organisation...
9 May 2020
One often tends to get entangled in the word ‘tabletop’ when one thinks of conducting a cyber tabletop exercise for their organisation. It is natural to think of this exercise...
8 May 2020
We are often asked about the benefits of internal cyber incident response training over our public or online training. This blog talks of the advantages of running an internal...
7 May 2020
In this blog, I share why our clients who do ISO 27001 audits are including cyber tabletop exercises audits in their audit schedules. 
6 May 2020
To ensure some sense of order when you are attacked, start by following the cyber incident response checklist.
5 May 2020
If you’re one of those smart business executives who knows how important running a cyber tabletop exercise for their organisation is, you’ve won half the battle! The other half...
2 May 2020

Free Cyber Incident Response Plan Template

Optimised Document Structure, Easy to understand guidance on Cyber Incident Planning & Response and a ZERO-FLUFF approach makes this cyber response plan template immediately useful.

Simply fill in your details in the form below to receive your copy and more free mind maps and checklists.