One place for you to find all you may need
One of the key artefacts you need to produce as part of your planning for responding to a cyber attack is a Cyber Incident Response Plan. A document that guides you on what actions to take and how to take those actions.
Download our ransomware prevention checklist to boost your ransomware readiness.
Free, no-nonsense ransomware response guide on what to do when you’ve been hit by a ransomware attack.
Why Cyber Essentials & How Do I Prepare for Cyber Essentials? This Checklist answers both these fundamental cybersecurity questions.
Easy, non-technical ransomware incident response checklist on how to respond to a ransomware attack
An informational visual timeline of the the Solarwinds cyberattack, we have created a visual timeline and an accompanying detailed report.
Another informational visual timeline of an attack. For the Easyjet cyberattack, we have created a visual timeline and an accompanying detailed report.
Incident Response is our passion and we study and analyse cyber-attacks to create an informational visual timeline of attacks. For the Travelex cyberattack we have created a visual timeline and an accompanying detailed report.
Download our Cyber Crisis Tabletop Exercise (CCTE) checklist and ensure you have thought about all the different aspects of running a successful tabletop exercise.
In this PDF, we cover guidelines on topics including:
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course, shares the basics you need to know to create a cyber incident response playbook.
Download our Preparing for a Crisis checklist and ensure you have thought about all the different aspects of managing a cyber crisis.
How do you communicate during the Golden Hour of a Cyber Attack? Download our Data Breach Definition document to find out.
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course discusses the concepts of taxonomy and the need to standardise communication channels during a cyber attack
Learn how to Identify Cyber Threat Actors out to harm your business
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course shares ideas on how to identify cyber threat actors or cyber adversaries that you can use to create your own Threat Actor Library.
Having a cyber incident response plan without an attack scenario is like getting into a car and driving aimlessly. You need to know your final destination.
This mind map, taken from our NCSC-Certified Cyber Incident Planning and Response course, points out the various components you need ready before you build your attack scenario.
Before you do tear up your current incident response plan, take a look at our simple 5 points to consider and get right when creating a response plan.
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
There is no time during a cyber-attack. Use our 60 Second 10 points checklist to cover all your bases.
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
If you want to understand more about the concepts, benefits, stages of implementation and services available surrounding document security technologies, download our document security mind map.
In episode two of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the collection of personal information and how it is guided by the six core principles.
Crowd-Sourced PDF contains a number of checklists including:
Checklists covering various topics including
A free GDPR preparation kit containing items such as:
This mind map, taken from our NCSC-Certified Cyber Incident Planning and
A CISSP resource and study aid to help you keep track of domains. An essential resources for all CISSP aspirants.
Download your copy today.
In episode five of our General Data Protection Regulation (GDPR) mini-webinar
In episode six of our General Data Protection Regulation (GDPR) mini-webinar series we discuss the roles and responsibilities of the Data Protection Officer.
In episode seven of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the process of incident response in the event of a regulatory breach.
Our Data Breach or Cyber Incident Action checklist will help you prepare and plan a defined response to a cyber attack or data breach.
This report has researched and analyzed prominent providers of Privileged Access Management (PAM) solutions based on select criteria and discussions with customers and product distributors.
The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business.
If you reckon that users are the first line of defence against ransomware,you are WRONG!
We are all humans and we make mistakes and ransomware creators know that. Learn what you can do to protect your business.
Learn how to:
* How to design play-books (aka run-books) for different attack scenarios.
* How to align your incident response to official standards.
* Learn more about a day in the life of an investigator.
* How to create an effective triage process that works for every type of attack.
* Discover the various types of data enrichment attributes to apply to every incident.
There are almost 300 controls you could review and select for this year or you can view this webinar and hear what the experts have to say about the most essential controls and how to use them to lay the foundations of a secure resilient business. Let's design a more secure 2017 together.
Businesses may be aware of the scale of the privileged insider threat but efficiently managing these users often remains an aspiration. Join Amar Singh in this interactive webinar as he talks to privileged management expert Joseph Carson and discusses how you can expertly manage your privileged users.
Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits.
DFLabs, Founder and CEO, Dario Forte shared his insights on how to build an effective SOC utilising incident response automation and orchestration.
Tune into this session to get the lowdown on where the attacks came from; who was behind them; what they mean for the cyber security industry and how you can improve the protection for your business the next time something similar rolls along.
One of UAE’s leading banks is spearheading the drive to deliver world-class digital customer engagement. Download this exclusive case study and understand why Tushar focuses on threat intelligence and the key decisions the bank made when selecting their threat intelligence feed.
The ideal guide to understand all things DNS. The ever-exciting Mind Map helps you understand everything from DNS and its cybersecurity benefits to DNS based cyber attacks etc.
Practitioners, specialists, thought leaders and experts in cybersecurity and data privacy
Get the intelligence and knowledge about this Wannacry Ransomware. Crowdsourced contributions by many who wanted the make the Cyber a better place, the guide is all about life-impacting cyber attacks.
Dhiraj Sasidharan, the former Director of information security at Dubai Holdings, which Jumairah Group is also a part of, talked about his formative years, the importance of training and passion, knowledge and training for CISOs and why it’s not just about technical skills in the ever-challenging cybersecurity sector.
Before you do tear up your current incident response plan, take a look at our simple 5 points to consider and get right when creating a response plan.
Quite simply, the confusion, the pressure during a cyber-attack can overwhelm even the most seasoned professional. An effective, easy to follow plan can mean the difference between a successful outcome or a long-lasting damaging aftermath.
W review how the UK-GCHQ Certified Training course, Cyber Incident Planning & Response or CIPR has helped organisations like the NHS and BMJ and discuss how you too can create actionable playbooks.
This webinar will cover topics such as:
- CIPR review - how it has helped organisations
- How to create actionable incident response playbooks,
- The flow and logic behind creating playbooks that work.
- Example playbooks around GDPR and Malware
In this webinar, Amar Singh and Steve Vickers explore the problems typically faced by organisations based on the latest research and show how organisations can create a seamless and secure SD-WAN infrastructure without having to manage multiple products.
In this webinar, several experts discuss their absolute security must-haves for cloud adoption
Topics covered:
- Secure configuration management and benchmarking.
- File storage and data transfer.
- Alerting and incident response.
- Authentication and identity management.
The Payment Card Industry Data Security Standard applies to any organisation accepting credit card details in some way or the other. This webinar is going to share some of the latest techniques cyber criminals are using to break web applications.
A non-technical discussion, we layout step by step guidance on what you can do:
- To save money on your current IT and security investments
- To ensure your third party is delivering the right level of security and service
- Increase your operational efficiency and lower total cost of operations.
Following on from our successful webinar, Breaking PCI-DSS Applications, we bring you our next instalment - How to Create a Complex DDoS attack in 5 steps. Watch:
- The details, step-by-step, on planning a DDoS attack
- The prerequisites for this plan to succeed
- The different tools that can be used to launch such an attack.
Understand more about the concepts, benefits, stages of implementation and services available surrounding DMARC technologies. Created together with our technology and solutions partners, Advanced Cyber Solutions, download your free copy.
The challenge for the security leader is straightforward yet highly challenging. You must allow the business to embrace and expand into the cloud and at the same time manage access to
privileged credentials that does not hinder productivity.
Read more in this report...
Download our executive summary that summarises the technologies & capabilities a business like yours needs to be truly resilient!
Download this executive summary that separates the wheat from the chaff and tells you how you can truly protect your business from cyber threats.
Download this executive summary on how cyber awareness training programmes can actually yield results & bring about habit change!
Download this executive summary to know how you can bring about real security behaviour change in your organisation!
© 2022 Cyber Management Alliance.