Preparing for a Crisis Checklist

Checklist for Preparing for a Cyber Crisis

Here is a challenge. Can you continuously spin 10 ceramic plate on each of your fingers (one plate on each finger) whist on a conference call with 20 people all speaking over each other at the same time and have your morning's cup of coffee? Oh wait, you have another call waiting on your phone and it's from the CEO who wants an update pronto!.

That was a simple metaphoric description of the challenges you will face when in the  'eye of the storm' in a cyber -attack.  The question is, are you prepared? 

Download our Preparing for a Crisis checklist and ensure you have thought about all the different aspects of managing a cyber crisis. 

** GDPR & Privacy ** We wholeheartedly believe in your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.

enter your details below to get your copy:

CYBER ESSENTIALS
CSC

We are industry experienced practitioners when it comes to cyber security training & cyber security consultancy services

Cyber Security Training

Training

We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop

Virtual CISO DPO

Virtual CISO and DPO

Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations

Cyber Security Events

Events

We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.

ISO27001

Cyber Essentials & ISO27001

Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements

GDPR GAP Assessment

Third Party Assessments

With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.

Cyber Security GAP Assessment

Security Gap Assessments

We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response

How we use your data:

  • Contact you about our services including, but not limited to, training, trusted advisory and consultancy.
  • Keep you posted on free resources and documents.
  • Update you on upcoming webinars and surveys.
  • Update you when we host our ground-breaking Wisdom of Crowds events.
  • Ask you, every now and then, if you want to take part in crowdsourced initiatives.
  • Our partners (we carefully select our partners) may contact you to arrange or demo or share more information with you about their products or services when you watch one of our sponsored webinars. Remember, you can always tell us or our partners, "No, not interested".

 Download the Remote Working Cybersecurity Checklist

A free guide on how to work securely while away from office.