RESOURCES PAGE

One place for you to find all you may need

GDPR Summary
GDPR Summary Sheet Personal Information
GDPR Checklist

In episode two of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the collection of personal information and how it is guided by the six core principles.at.

Cloud Security
Cloud Security Checklists
Wisdom of Crowds

Crowd Sourced PDF contains a number of checklists including:

  • Physical Security
  • Governance & Compliance
  • Incident Response and Availability

r-img.jpg
GDPR Checklists and Mind Map
Wisdom of Crowds

Checklists covering various topics including

  • Data Controller Checklist
  • CISO Checklist
  • DPO Checklist
  • GDPR Mind Map
GDPR Summary
GDPR Summary Sheet Applicability
GDPR Checklist
In episode one of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the application of the regulation and some of the exemptions.
GDPR Templates
GDPR Preparation Kit
Multiple Documents and Checklists

A free GDPR preparation kit containing items such as: 

  • GDPR template emails and letters
  • Breach registers
  • FREE GDPR Training course
r-img.jpg
Data Breach Incident Response Plan
Mind Map

This mind map, taken from our  GCHQ-Certified Cyber Incident Planning and Response  course, outlines several areas that an organisation must focus on to be GDPR breach ready. 

Free CISSP Training
CISSP Mind Map
Mind Map

A CISSP resource and study aid to help you keep track of domains. An essential resources for all CISSP aspirants.

Download your copy today. 

GDPR Checklist
GDPR Summary Sheet Data Subject's Rights
GDPR Checklist
In episode three of our General Data Protection Regulation (GDPR) mini-webinar series, we discussed the rights of data subjects such as withdrawal of consent and the right to be forgotten under the GDPR.
GDPR Checklist
GDPR Summary Sheet Security by Design
GDPR Checklist
In episode four of our GDPR mini-webinar series, we discussed the principle of security by design in personal data processing systems and how to conduct a DPIA (Data Privacy Impact Assessment).
GDPR Summary
GDPR Summary Sheet Fines & Penalties
GDPR Checklist

In episode five of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the fines and penalties which can be applied to various types of breaches.

GDPR Checklist
GDPR Summary Sheet The Data Protection Officer
GDPR Checklist

In episode six of our General Data Protection Regulation (GDPR) mini-webinar series we discuss the roles and responsibilities of the Data Protection Officer.

GDPR Checklist
GDPR Summary Sheet Incident Response
GDPR Checklist

In episode seven of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the process of incident response in the event of a regulatory breach.

GDPR Summary
GDPR Summary Sheet Third Parties
GDPR Checklist
In episode eight of our General Data Protection Regulation (GDPR) mini-webinar series we discuss working with third-parties and cross-border processing.
Data Protection by Design
Data Protection by Design
Wisdom of Crowds
Checklist to ask your Third Parties and record keeping requirements (Controllers and Processors). Over 60 Contributors from organisations including the European Data Protection Supervisor, ING, BAE Systems, Verizon and many others. 
Security Operations Centre
Maximising SoC Effectiveness With Advanced Threat Intelligence
Resource Subtitle
Running a security operations is not a simple undertaking. It takes skilled staff, technology, processes and procedures and loads of practice. In addition, actionable contextual threat intelligence is key when it comes to ensuring the SoC and its teams are affective in early detection of attacks. 

The key word here is EARLY detection. Join Amar Singh and his special panellists as they discuss some of the key pillars of threat intelligence and how to make them work in any SoC environment.
r-img.jpg
Privilege Access Management Vendor Evaluation Report
Analysis of prominent providers of Privileged Access Management (PAM) solutions.

Most vendors, with a dedicated perseverance, focus solely on features and buzz words to attract attention. This report has researched and analyzed prominent providers of Privileged Access Management (PAM) solutions based on select criteria and discussions with customers and product distributors.

r-img.jpg
Data Protection & Incident Response - Interactive
Improve And Build A More Resilient Business

Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.

How to Protect You and Your Business from Ransomware Attack
Ransomware Wins! User Awareness Doesn’t Work.
What Do you Do?

If you reckon that users are the first line of defence against ransomware,you are WRONG! We are all humans and we make mistakes and ransomware creators know that. Learn what you can do to protect your business. 

incident investigator duties
A Day In The Life Of An Incident Investigator
Real incident response play-books in action

Learn how to:

* How to design play-books (aka run-books) for different attack scenarios.
* How to align your incident response to official standards.
* Learn more about a day in the life of an investigator.
* How to create an effective triage process that works for every type of attack.
* Discover the various types of data enrichment attributes to apply to every incident.