Displaying out of 64
Easy to understand guidance on Cyber Incident Planning & Response
One of the key artefacts you need to produce as part of your planning for responding to a cyber attack is a Cyber Incident Response Plan. A document that guides you on what actions to take and how to take those actions.
Created at our flagship Wisdom of Crowds events.
This list contains the top Cyber Security Tabletop Exercise Scenarios that you must rehearse. It also contains crowdsourced knowldge on the top Asset Categories that you must prioritise and the biggest Threat Actors to watch out for.
The definitive resource for you to conduct an effective Cyber Security Tabletop Exercise
We have blended our world-leading expertise and deep experience to create this FREE Cyber Tabletop Exercise Template PPT for you.
The Definitive Collection of Every Expert-Led Resource You Need to Strengthen Your Cyber Resilience
Boost your cyber resilience with our expert-crafted Cybersecurity Toolkit. Packed with guides, templates, checklists, and strategies, this all-in-one resource helps you prevent ransomware, run effective tabletop drills, and strengthen incident response. Created by global leaders in Cyber Drills and Incident Response, it’s everything you need to sharpen your defences and stay ready for 2025.
Test your Cyber Incident Response Readiness with Effective Cyber Drills.
A free, expert-built resource to help you run powerful cyber drills that truly prepare your organisation. Inside you’ll get, a ready-to-use Checklist, customisable tabletop drill templates and PPTs, top 2025 Exercise Scenarios, blogs and case studies with proven success stories. Download your toolkit today and equip your team to practise, improve, and stay cyber-resilient.
The ultimate collection of proven resources to prevent, respond to and recover fast from ransomware attacks.
Preparation is the only real defence against ransomware attacks. Our Ransomware Toolkit has been created by world-leading cyber incident response experts to help you strengthen defences, detect threats earlier, and respond decisively when attacks strike. Designed for security teams and business leaders alike, it arms you with the practical guidance and strategies you need to stay resilient against ransomware.Download your toolkit today and be ready before attackers make their move.
Expert-created resources that will help you dramatically enhance your resilience against evolving cyber threats.
A powerful set of expert-built resources trusted by leading organisations worldwide. From response plans to NIST-aligned playbooks, it gives you everything you need to plan, test, and strengthen your defence.Download your toolkit today and ensure your organisation is ready for whatever comes next.
Explore our JLR Cyber Attack Timeline that breaks down how this devastating attack unraveled and the impact that ensued, not just on JLR but its employees, customers and the entire automotive supply chain.
In late August 2025, Jaguar Land Rover experienced a major cyber incident when unusual activity prompted the company to shut down its manufacturing and put its systems offline globally. The company disclosed that some data had been compromised and regulators notified. This attack has further amplified the growing trend of cyber-crime in the UK — one that now stretches beyond retail into manufacturing, where operational downtime can translate into millions in lost revenue and shattered customer trust.
We’ve captured everything that took place in this headline-making cybersecurity incident in our Marks & Spencer Cyber Attack Timeline and Visual Summary Image.
M&S has reportedly faced losses to the tune of £1 billion due to a devastating cyber attack. It has also, apparently, shed over 12 per cent of its value or £1.05 billion since the hack on Easter weekend.
Concise Intelligence on the F5 Networks security incident
The F5 incident has triggered alarm across critical-infrastructure, government and enterprise networks due to the scale of exposure and the risk of custom exploit development. Download our Cyber Insights Document to understand exactly what happened and what the repercussions of this breach mean for the impacted organisations.
The incident forced the company to pause new registrations and involved a DDoS attack and the exposure of two unsecured databases containing over a million sensitive records — including user chats, API keys, and backend data. Explore the full story in our DeepSeek Cyber Attack Timeline.
Unravel what the AWS Outage meant for the global business community
In October 2025, Amazon Web Services (AWS) suffered a major outage in its US-EAST-1 region. The incident exposed a harsh reality: even the world’s most trusted cloud platforms can experience catastrophic downtime due to a single point of failure. Understand the full impact of this outage with Cyber Insights document.
For A Defined Response To Cyber Attack/Data Breach.
Our Data Breach or Cyber Incident Action checklist will help you prepare and plan a defined response to a cyber attack or data breach.
A detailed breakdown of the breach, including the attacker’s tactics, the root-cause and the lessons every business can learn.
Discord disclosed a serious data-security incident arising from the compromise of one of its third-party customer support providers. The vendor’s ticketing system was accessed for a period of approximately 58 hours starting in end September, giving threat actors visibility into support tickets, user names, email addresses, IP addresses, partial billing metadata and even – for a subset of roughly 70,000 users – government-issued ID images submitted for age checks. Our Insights document gives you a quick overview into what went down in this major cybersecurity event.
The massive Salt Typhoon cyber espionage campaign made waves globally, particularly in the US.
This supposedly state-sponsored operation targetted essential infrastructure, government bodies, and major industries worldwide. We've compiled the developments since these nation-state actors have sought to establish a foothold in critical US infrastructure with our Salt Typhoon Cyber Attack Timeline.
Unravel the massive Jaguar Land Rover cyber incident that forced a global shutdown of its IT systems and manufacturing operations
In early September 2025, Jaguar Land Rover faced a major cyber attack. Production across its UK plants was halted for weeks, causing widespread disruption through its supplier and logistics networks. The event exposed how a single breach can cripple even the most advanced industrial ecosystems. Our Cyber Insights document on the JLR attack offers a concise, expert breakdown of the incident—what happened, why the impact was so severe, and the critical lessons it holds for manufacturers and supply-chain-dependent businesses worldwide. Download your copy now to uncover key takeaways and strengthen your organisation’s cyber resilience.
Are you thinking of running a cyber scenario tabletop exercise to test your existing incident response plans and procedures?
Download our Cyber Crisis Tabletop Exercise (CCTE) checklist and ensure you have thought about all the different aspects of running a successful tabletop exercise.
A Customisable Template for your Cyber Security Drills
You can use this cyber tabletop exercise template as a guide for conducting your own successful cyber security drill!
Insights on an especially disturbing cyber attack that targetted minors and used threats against parents.
The UK-based nursery chain fell victim to a harrowing ransomware and data-extortion attack. The attackers claimed to have exfiltrated personal data on approximately 8,000 children and their families, threatening publication if a ransom was not paid. Our Cyber Insights document not only summarises what happened in this disturbing cyber event but also looks into the impact on the global education and childcare community at large.
Download this free NIST Incident Response Playbook Template
Looking to create a NIST-based Security Incident Response Playbook for your organisation? Don't know where to start? Look no further than our FREE, downloadable and easy-to-customise NIST Incident Response Playbook Template.
Concise Intelligence and Timeline Summary of the Asahi Cyber Attack
The attack highlighted how vulnerable manufacturing and supply-chain-driven organisations are to ransomware. Beyond system lockouts, such attacks can paralyse logistics and operations. For a full yet crisp timeline, technical details, and expert insights, download our complete Cyber Insights document.
Download this free NIST Incident Response Playbook Guide
Our cybersecurity experts have now created this comprehensive guide which shows you how to create your own NIST Incident Response Playbook. This Guide contains all the expert insights, tips and suggestions you need straight from our trainers & experts who have also assisted several organisations in significantly improving their Incident Response capabilities, including through the use of effective IR Playbooks.
Free 9-step ransomware prevention checklist.
Download our ransomware prevention checklist to boost your ransomware readiness.
Unpacking the turning point in software development security
The Shai-Hulud cyber attack acted as wake-up call for software supply chain security. A self-replicating worm infiltrated the npm JavaScript ecosystem in September 2025—compromising maintainer accounts, stealing developer credentials and injecting malicious code into hundreds of trusted packages. By exploiting the foundation of open-source trust, the attack spread rapidly across CI/CD pipelines and developer environments worldwide. For security leaders, this event underscores the urgency of auditing dependencies, rotating credentials and reinforcing software supply-chain defences. Our Cyber Insights document provides a clear, expert summary of the attack, its cascading impact and the essential lessons for safeguarding your development environments.
Free Ransomware Response Guide
Free, no-nonsense ransomware response guide on what to do when you’ve been hit by a ransomware attack.
Download our FREE Ransomware Incident Response Checklist.
Easy, non-technical ransomware incident response checklist on how to respond to a ransomware attack
Educational & easy-to consume visual guides to understanding attacks & enhancing resilience
Evolve Bank & Trust, a U.S.-based banking-as-a-service provider, suffered a significant cyber attack orchestrated by the LockBit ransomware group.
A deep-dive into how Third-Party Integrations can become the Weakest Security Link
In August 2025, a sophisticated supply-chain attack on SalesLoft Drift exploited its OAuth integration with Salesforce, allowing threat group UNC6395 to access hundreds of corporate environments and exfiltrate vast amounts of CRM and cloud-service data. The breach, which stemmed from a compromised GitHub account months earlier, revealed how a single integration failure can ripple through global networks—impacting even leading tech and cybersecurity firms. Our Cyber Insights document unpacks the full chain of events, from initial compromise to large-scale data exposure, and distils key lessons for securing connected platforms. Download your copy now to learn how to strengthen your incident-response and vendor-risk management strategies.
Educational & easy-to consume visual guides to understanding attacks & enhancing resilience
Halliburton, one of the largest Oilfield Services Companies globally, announced that an unauthorised third party had infiltrated some of its systems
Executive Summary & Analysis on the Major Ransomware Attack Crippling Critical Infrastructure
Between 19 and 21 September 2025, multiple major European airports—including Heathrow, Brussels, Berlin Brandenburg, Dublin and Cork—faced widespread operational disruption after a ransomware attack on Collins Aerospace’s “MUSE” system crippled core airport functions. The incident highlighted how a single third-party breach can trigger continent-wide chaos and expose critical gaps in aviation’s digital resilience. Our Cyber Insights document offers a concise breakdown of the attack, its wider impact and the key lessons for aviation and critical-infrastructure leaders.
An informational visual timeline of the attack.
Disney suffered a massive data breach, leaking over 1.1 terabytes of sensitive information from their internal Slack channels. The breach exposed confidential data related to Disney Cruise Line crew members and theme park guests, including personal information such as addresses, birth dates, and passport numbers.
Your Checklist on Ensuring You are Ready for a Cyber Crisis.
Download our Preparing for a Crisis checklist and ensure you have thought about all the different aspects of managing a cyber crisis.
A Simple, Non-Technical Checklist To Help You Prepare For Cyber Essentials
Why Cyber Essentials & How Do I Prepare for Cyber Essentials? This Checklist answers both these fundamental cybersecurity questions.
How we can help you negotiate better Cybersecurity Insurance Premiums
This document contains a list of 10 specific services rendered by Cyber Management Alliance which can not only help you achieve greater cyber resilience but also improve your chances of lowering your cyber insurance premiums.
Improve the Likelihood of Better Cyber Insurance Premiums.
Cyber attacks are unbelievably costly to indemnify and the costs obviously get translated into higher cyber insurance premiums. But there are steps that you can adopt today to improve your chances of negotiating a better cyber insurance premium on your policy.
An easy to understand, to-the-point checklist covering various aspects of working remotely.
In this PDF, we cover guidelines on topics including: Cybersecurity Privileged Users, Online meetings, GDPR & Privacy, Backups and more
Review our detailed workflow on creating a cyber incident response playbook
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course, shares the basics you need to know to create a cyber incident response playbook.
A breakdown of one of the major attacks on UK retailers in 2025
In April 2025, UK retail giant Co-op suffered a sophisticated cyber-attack that forced it to shut down critical IT systems—disrupting stock ordering, logistics, and store operations nationwide. The breach later proved even more severe, with hackers accessing personal data belonging to over 6.5 million members, marking one of the UK’s largest retail data exposures in recent history. Our Cyber Insights document unpacks the full story—detailing the attack timeline, vulnerabilities, and key lessons for building resilient supply chains and response capabilities. Download your copy now to learn how to strengthen your organisation’s defences and incident-response readiness.
The Need for Common Taxonomy During a Cyber Attack
How do you communicate during the Golden Hour of a Cyber Attack? Download our Data Breach Definition document to find out. This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course discusses the concepts of taxonomy and the need to standardise communication channels during a cyber attack
Learn how to Identify Cyber Threat Actors who are out to harm your business
Learn how to Identify Cyber Threat Actors out to harm your businessThis workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course shares ideas on how to identify cyber threat actors or cyber adversaries that you can use to create your own Threat Actor Library.
Review this mind map before you create your attack scenarios
Having a cyber incident response plan without an attack scenario is like getting into a car and driving aimlessly. You need to know your final destination. This mind map, taken from our NCSC-Certified Cyber Incident Planning and Response course, points out the various components you need ready before you build your attack scenario.
Wisdom of Crowds
Crowd-Sourced PDF contains a number of checklists including:Physical SecurityGovernance & ComplianceIncident Response and Availability
Download our Data Breach Response Plan Mind Map Today
This mind map, taken from our NCSC-Certified Cyber Incident Planning and Response course, outlines several areas that an organisation must focus on to be GDPR breach ready.
An informational visual timeline of the attack.
We study and analyse cyber and ransomware attacks to create informational visual timelines.For the Royal Mail Ransomware Attack, we have created a visual timeline and an accompanying detailed report. Download it now
There is no time during a cyber-attack. Use our 60 Second 10 points checklist to cover all your bases. This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
An informational visual timeline of the attack.
An informational visual timeline of the the Solarwinds cyberattack, we have created a visual timeline and an accompanying detailed report.
An informational visual timeline of the attack.
American Mortgage Lending Giant, Mr. Cooper, was hit by a cyber attack towards the end of last year. The company had to shut down IT systems including access to their online payment portal, creating quite a ruckus amongst customers who were unable to make their payments on time. In about a week, however, the company managed to bring its payment facility online.
Before you do tear up your current incident response plan, take a look at our simple 5 points to consider and get right when creating a response plan.This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
An informational visual timeline of the attack.
On June 4, 2024, the NHS UK declared a 'Critical Incident' following a cyber-attack on its pathology services provider, Synnovis. This attack, orchestrated by the Qilin Ransomware Gang, resulted in cancelled operations and the diversion of emergency patients. Additionally, the attackers leaked 400 GB of sensitive personal data and attempted to extort Synnovis for money.
An informational visual timeline of the attack.
The ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, began on February 21, 2024, disrupting services across U.S. healthcare providers and pharmacies. Eventually, the attack became a lesson in how attacks on healthcare companies can have seriously damaging and cascading effects. It also highlighted why ransom payments are NEVER a solution.
An informational visual timeline of the attack.
We scrutinize past cyber-attacks, ransomware attacks and data breaches to understand the tactics, techniques and procedures most commonly used by threat actors. Download our 23andMe Cyber Attack Timeline today.
An informational visual timeline of the attack.
The UK Ministry of Defence (MoD) faced a significant cyber attack through a third-party payroll system, leading to severe repercussions. The breach exposed sensitive data of 270,000 personnel, including active service members, reservists, and veterans from all three branches of the armed forces. This incident has sparked considerable political controversy and highlighted the critical importance of third-party cybersecurity measures.
An informational visual timeline of the attack.
For the Western Digital Cyber Attack, we have created a visual timeline and an accompanying detailed report. Download it now.
An informational visual timeline of the attack.
The massive Snowflake cyber attack has impacted companies such as Pure Storage, Ticketmaster, and Advance Auto Parts. Hackers themselves have suggested that at least 400 organisations may have been compromised by this attack.
An informational visual timeline of the attack.
Incident Response is our passion and we study and analyse cyber-attacks to create an informational visual timeline of attacks. For the Travelex cyberattack we have created a visual timeline and an accompanying detailed report.
An informational visual timeline of the attack.
Another informational visual timeline of an attack. For the Easyjet cyberattack, we have created a visual timeline and an accompanying detailed report.
Wisdom of Crowds
Checklist to ask your Third Parties and record-keeping requirements (Controllers and Processors). Over 60 Contributors from organisations including the European Data Protection Supervisor, ING, BAE Systems, Verizon and many others.
An informational visual timeline of the attack.
For the Barracuda Email Security Gateway Hack, we have created a visual timeline and an accompanying detailed report. Download it now.
Everything you wanted to know about GDPR but was afraid to ask
Practitioners, specialists, thought leaders and experts in cybersecurity and data privacy have worked together to co-author a book on GDPR. We present Wisdom of Crowds's first collaborative e-book.
An informational visual timeline of the attack.
AT&T experienced a massive data breach. Earlier estimates suggested that roughly 73 existing and former customers had their data compromised. The company later confirmed that the actual number was 51 million.
An informational visual timeline of the attack.
In May 2024, Ascension Health, one of the largest U.S. healthcare systems, fell victim to a ransomware attack. The breach severely impacted hospital operations across multiple states, disrupting Ascension’s electronic health record (EHR) system MyChart.
An informational visual timeline of the attack.
For the AIIMS Ransomware Attack, we have created a visual timeline and an accompanying detailed report. Download it now.
Wisdom of Crowds
Checklists covering various topics including: Data Controller, Checklist, CISO Checklist, DPO Checklist and our GDPR Mind Map
Multiple Documents and Checklists
A free GDPR preparation kit containing items such as: GDPR template emails and letters, Breach registers, FREE GDPR Training course.