Binary code screen2-378747-edited-436179-edited

Defining A Data Breach

Download our Data Breach Definition document to find out.

define-data-breach NCSC Certified Training B&W

Download and review our Data Breach Definition workflow today

How do you communicate during the Golden Hour of a Cyber-Attack?

Download our Data Breach Definition document to find out.  

This workflow, taken from our  NCSC-Certified Cyber Incident Planning and Response  course discusses the concepts of taxonomy and the need to standardise communication channels during a cyber-attack.  

Do note that the majority of cybersecurity standards such as ISO 27001, ISO 22301, PCI DSS recommend organisations to develop a Data Breach or  Cyber Incident Response Plan. 

** GDPR & Privacy ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.

enter your details below to get your copy:

cyber-essentials-certification
NCSC Certified Logos B&W
CSC

How we use your data:

  • The form above collects personal information so we may email you the requested information and pressing the "Get your free copy now" or the "Download your mind map"  button acts as informed consent for this processing purpose. Consequently we may be in touch to:

    • Update you when we host our ground-breaking Wisdom of Crowds events in your country or region.
    • Keep you posted on free resources and documents around Wisdom of Crowds events and its outputs. (For example, we tend to create insightful mind maps and we also are the creators of free to view Insights with Cyber Leaders Video Interviews. )
    • Inform you about upcoming and FREE educational webinars on GDPR and Cybersecurity.
    • Inform you of upcoming courses including Data Breach Response or Cyber Incident Response training.
    • Offer you advisory and support on achieving cybersecurity and privacy.     
  • In its purest interpretation, this act of us communicating with you is direct marketing and is processed on the basis of our legitimate interest and your engaging in our services. All marketing communication will include an unsubscribe button or other method of ending communication.

Download the Data Breach Response Mind Map Today

A GDPR resource to help you create a defined data breach response process. 

download template