Cybersecurity Blog

The Building & Optimising Incident Response Playbooks Course, the third from CM-Alliance to achieve the NCSC certification, focusses on creation of NIST-compliant Playbooks
22 July 2021
Remote working and cybersecurity risks, unfortunately, go hand in hand. As the COVID-19 pandemic appears to be far from over, cyber threats to individuals and businesses...
21 June 2021
“Is Zoom safe? Is Zoom going to compromise our cybersecurity?" These are some of the questions asked by our clients and prospects about the video conferencing service. In this...
17 June 2021
It is likely that you have heard of a virtual private network, at least in passing, before. As the pandemic continues, the growing threat of cyber-attacks has further...
10 June 2021
Cyber Security has quickly evolved from being just an IT problem to a business problem. Recent attacks like those on Travelex and the SolarWinds hack have proved that...
2 June 2021
Cyber Incident Planning & Response has become a top priority for banking and financial institutions across the world as they transition into the realm of digitization. With...
25 May 2021
2020 saw a huge shift to remote working due to the global health crisis, and despite some cyber security concerns, this may be a trend that will continue even once the pandemic...
20 May 2021
Conducting regular security incident response tabletop exercises is the only non-destructive way to prepare your organisation for ransomware or other types of cyber attacks....
14 May 2021
Cyber-attacks are more rampant today than ever before. Attacks like the SolarWinds hack prove that even the biggest and strongest organisations in terms of cyber security...
12 May 2021
Cybersecurity is a huge concern for small to medium businesses. Cybersecurity threats have amplified in 2021 since the advent of the COVID-19 pandemic and the ensuing ‘Work...
11 May 2021
WordPress, one of the most popular platforms for creating websites, has been targeted due to a security vulnerability that hackers discovered in a common plugin used with the...
6 May 2021
A Cyber Incident Response Plan is a straightforward document that tells IT & cybersecurity professionals what to do in case of a security incident like a data breach or a leak...
6 May 2021
Artificial intelligence endeavours to simulate human intelligence. It has immense potential in cybersecurity. If harnessed correctly, Artificial Intelligence or AI systems can...
4 May 2021
What exactly is cybersecurity and why does cyber security matter to every person and company?  We start by providing an easy to read answer in this blog, the first on many on...
30 April 2021
Given the complex cybersecurity challenges created by the Covid-19 pandemic, it has become imperative for organisations to regularly test their cyber resilience, security...
27 April 2021
Like many industries, the supply chain sector is in the midst of a digital transformation — from automation of tasks to the Internet of Things streamlining operations. However,...
22 April 2021
Aster Housing regularly conducts annual cybersecurity audits. However, this time around, it chose to host a Cyber Crisis Tabletop Exercise (CCTE) with Cyber Management Alliance...
20 April 2021
Cyber tabletop exercises are the flavour of the season in the world of IT security. The COVID-19 pandemic has exposed vulnerabilities in the security infrastructure of...
15 April 2021
The Monetary Authority of Singapore (MAS) has recently released revised Technology Risk Management (TRM) guidelines to combat the growing threat of cyber risk in the financial...
13 April 2021
Who should read this?  Anybody and everybody interested in managing privileged users, anyone looking to buy a PAM solution or anyone looking to renew their existing Privileged...
31 March 2021
Cyber Management Alliance has recently added some of the world's most prestigious organisations including Google, Formula One, Sony, BAE Systems, Citibank, AstraZeneca,...
31 March 2021
In the pandemic-stricken global scenario, we are constantly being alerted to the rising dangers and looming threats of cyber-crime. What the easyJet cyber-attack teaches us,...
30 March 2021
Bharti Airtel, India's 2nd largest telecommunications company with operations in 18 countries across Asia and Africa, recently organised an exclusive private internal CIPR...
25 March 2021
Over 300 staff members of the NHS attended CM-Alliance’s flagship, NCSC-Certified Cyber Incident Planning and Response training, over a course of three months. 
16 March 2021
Recently, 15 local councils of Essex County underwent the NCSC-certified training to bolster their overall security posture by raising staff awareness and refreshing their...
9 March 2021
It is often assumed that cybersecurity training and awareness is a matter of concern for only large businesses and enterprises as they are more vulnerable to threats and have...
29 October 2020
Organisations that are reviewing their cyber incident response plans or even those that are looking to improve their cybersecurity maturity need to focus on identifying their...
27 October 2020
How customer/citizen data is processed and used is a highly regulated subject in many parts of the world. The GDPR is perhaps the most prominent and well-known example of data...
22 October 2020
There is no such thing as an "unhackable" system. In general, cybersecurity can be described as ensuring that there is no unauthorised access to an enterprise’s network, to...
13 October 2020
The Travelex cyber-attack  (just like many others) contains overwhelming lessons about cyber incident response and cyber crisis management for those who wish to seek them out....
7 October 2020
The ultimate goal of any cybersecurity endeavour or cybersecurity training programme is to thwart an attack and emphasize on the need for training people and systems to...
16 September 2020
You’re aware that without a cyber incident response plan you’re exposing your business to incomparable risk. You also know that these response plans are reliable only if you...
15 September 2020
Every business needs a fit-for-purpose cyber incident response plan to enable them to rapidly and effectively respond to a cyber-attack. This blog provides ideas on how you can...
10 September 2020
In this article, we discuss combining Nmap and Metasploit together to perform port scanning and enumerate for vulnerabilities.
8 September 2020
If you’re a smart business owner or executive, you already know that you should peg your security infrastructure and the safety of sensitive data as top priorities. To ensure...
8 September 2020
A successful cyber-attack can be the downfall of any well-positioned business. Data breaches not only cause significant financial losses but are also the leading cause of a bad...
4 September 2020
Project Management & Cybersecurity Training have become inextricably linked today. Successfully planning and executing a business/IT project for a client is almost impossible...
4 September 2020
Artificial Intelligence (AI) and Machine Learning (ML) have become the kind of buzzwords that are used so often, it’s fair to say that they are almost abused. They are usually...
1 September 2020
Amar Singh, Founder & CEO of CM-Alliance and Patrick Bayle, Senior Systems Engineer at Cortex (a Palo Alto Networks company) delve into how Cortex’s XSOAR can automate 95% of...
6 August 2020
Cyber threats loom large today. So, have you wondered what actually happens during a cyber-attack? Can cybersecurity training and specifically incident response training help...
22 July 2020
There is a vast array of threat intelligence data out there and a variety of platforms that help businesses collect such insights. But is this data contextual, consumable,...
14 July 2020
We discuss cybersecurity training for non-IT and non-technical business executives in this blog. As a bare minimum, these professionals must have a working knowledge of cyber...
7 July 2020
Selecting the right type of cyber incident response training has never been this important.  No organisation today is exempt from being vulnerable to cyber-attacks, which makes...
18 June 2020
You can never be too prepared when it comes to cybersecurity and data privacy. For the health of your business, it is essential to continuously test your cyber incident...
15 June 2020
Cyber Management Alliance, the global frontrunner in cyber crisis management and training, is delighted to announce that its highly popular course, Cyber Incident Planning &...
2 June 2020
In any discussion on cyber incident response & resilience, it is imperative to deliberate upon the subject of threat actors. After all, if you can’t identify who could...
27 May 2020
We reviewed SAMA, QCB & NESA Regulations on Business Continuity Planning, Testing & Cyber tabletop exercises and created an easy reference for you. We will be updating this...
24 May 2020
We have created an optimised cyber incident response plan template for you to download along with some guidance on how to fill it in and how to make it personal to your...
22 May 2020
To discuss cyber incident response with the CEO, you must be familiar with ISO 27001, NIST's CSF, PCI-DSS NCSC'S Cyber Assessment Framework and other regulations and standards...
11 May 2020
Cyber incident response training is an important investment for today's business leaders. It's crucial that executive and management professionals throughout the organisation...
9 May 2020

Free Cyber Incident Response Plan Template

Optimised Document Structure, Easy to understand guidance on Cyber Incident Planning & Response and a ZERO-FLUFF approach makes this cyber response plan template immediately useful.

Simply fill in your details in the form below to receive your copy and more free mind maps and checklists.