GCHQ-Certified Cyber Incident Planning & Response, Strategies & Best Practices for responding to a Data Breach
We have trained over 100 organizations including:
This course will enable you to prepare a defined and managed approach when responding to a data breach or cyber attack of an information asset. The content is intended for senior management and business executives who wish to gain a better understanding of incident response or who are responsible for helping organisations plan and prepare for potential cyber threats, and effectively deal with actual cyber attacks. This is not a technical course therefore there are no prerequisites.
This cybersecurity training course provides senior management and incident response teams with the vital processes, knowledge and skills to lead and manage a cyber crisis. The course is designed for senior management involved in responding to a cyber or data breach across an organisation. Including staff involved in:
(ISC)2 members can claim 8 CPE points for attending this course.
This training is available as a one-day public course ora two-day internal workshop.
GCT is part of the UK Government’s initiative to address the shortage of skilled cyber security professionals. GCHQ helps protect the Government’s communications and electronic data – it is one of the three UK Intelligence and Security Agencies alongside MI5 and the Secret Intelligence Service (MI6).
With so many cyber security training courses available, GCT certification enables organisations to distinguish between reputable courses and ones that have not been validated using a Government-endorsed assessment process.
The GCT scheme is underpinned by the industry-respected IISP framework assessing the quality of the course materials, and the trainer's delivery of the course against GCHQ’s exacting standards. Attendees can therefore be confident that they’re embarking on a training course that has been recognised for excellence by a UK Government-developed cyber security scheme.
- Threat Actors in Detail
- Threat Agents Intent and Attributes
- Detection and Response Strategies
- What is incident orchestration?
- Using incident orchestration to significantly reduce time to respond to data breaches
- How to semi-automate and fully automate incident management
- Using incident orchestration to empower and up-skill existing staff
- Incident orchestration as a Force Multiplier
- Using orchestration to increase compliance
- Crisis Comms Plans management
- Social media and PR key steps
- PR case study
- Breach notification
Amar Singh has a long history and experience in data privacy and information security. Amar has served as CISO for various companies, including News International (now News UK), SABMiller, Gala Coral, Euromoney and Elsevier. Amongst various other activities, Amar is a Global Chief Information Security Officer and Trusted Advisor to a number of organisations including a FTSE100 firm, and is chair of the ISACA UK Security Advisory Group. He also founded the not-for-profit cyber security service for charities, Give01Day.
Amar has the highest integrity and is trusted by FTSE100 companies with some of the most sensitive commercial information, and has been involved with highly sensitive forensic investigations.
He has the ability to deal with both the technically astute, board-level executives and lead an organisation's information security direction. Apart from his experience and abilities, Amar holds a number of industry-recognised certifications, such as ISO 27001 Certified ISMS Lead Implementer, MoR, CRISC and CISSP certification.
Amar is an industry-acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including The BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the AlJazeera English Channel.
All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.
London | 3rd July | Click Here |
Copenhagen | 5th July | Click Here |
Amsterdam | 10th July |
|
Brussels | 11th July |
“I found the course to be very interesting. It not the usual bookish theoretical type, of course, it was quite interactive.."
CIO, Rak Bank, Dubai
“Amar Singh brings a wealth of personal experience and knowledge.”
President ISACA UAE
“The course was excellent. Not the typical core text book training but giving valuable insights and experiences.”
Head of IT, Bank of Sharjah, UAE
“This was the most interesting and attractive courses I have ever attended. A lot of inside knowledge was shared.”
Head of Audit, Emirate Global Aluminium, UA
"I wish all Senior Executives attend this course. It’s the most practical course I have ever attended. It teaches you not just how to understand but also how to respond to a Cyber Attack. ."
"The information we learnt provoked plenty of conversation both around personal experiences with the challenges that I face in the business and also backing up what was said in the course with real-life examples"
"The training was very informative and well knowledgable and i would recommend this course to anyone who wishes to explore cyber security even further."
IT Director, Christ the King Sixth Form Colleges London
"It’s been a great two days of learning. We drilled down, we simplified how an incident should be detected and how an incident should be handled. One of the key learnings I have taken is define normal. ."
"The overall training was good, it was quite informative. I highly recommend this training session to at least the CXO level people because it is something very meaningful for them and it can be very beneficial for organisations."
"Amar is a good mentor because he did more than just teaching. The checklist and mind maps are a really good part of the course. ."
IT Manager, HLB HAMT, Dubai UAE
"Amar is an excellent tutor and mentor also. The key aspects of the training is interactive sessions. Everyone has shared their experiences. I gained much knowledge which will be useful for my day to day activities."
"I really learnt a lot from this course as it was the first cyber security course I have been on. What I liked the most was the mind-mapping."
Paramount Computer Services, Dubai UAE
"I recommend everyone to attend this course whether your business is at the beginning or whether you have already implemented some of the IT security procedures. Even if you think you are protected but in fact it is not protected.."
I wish all Senior Executives attend this course. It’s the most practical course I have ever attended. It teaches you not just how to understand but also how to respond to a Cyber Attack.
Chief Risk Officer, Rak Bank, Dubai UAE
The information we learnt provoked plenty of conversation both around personal experiences with the challenges that I face in the business and also backing up what was said in the course with real life examples.
Head of Service Delivery,
British Medical Journal
The training was very informative and well knowledgable and i would recommend this course to anyone who wishes to explore cyber security even further.
IT Director,
Christ the King Sixth Form Colleges London
It’s been a great two days of learning. We drilled down, we simplified how an incident should be detected and how an incident should be handled. One of the key learnings I have taken is define normal.
Paramount Computer Services,
Dubai, UAE
The overall training was good, it was quite informative. I highly recommend this training session to at least the CXO level people because it is something very meaningful for them and it can be very beneficial for organisations
Trusted Security Advisor,
Starlinks, Dubai UAE
Amar is a good mentor because he did more than just teaching. The checklist and mind maps are a really good part of the course.
IT Manager, HLB HAMT, Dubai UAE
Amar is an excellent tutor and mentor also. The key aspects of the training is interactive sessions. Everyone has shared their experiences. I gained much knowledge which will be useful for my day to day activities.
Manager Information Security Audit,
RAK Bank, Dubai UAE
I really learnt a lot from this course as it was the first cyber security course I have been on. What I liked the most was the mind-mapping.
Paramount Computer Services, Dubai UAE
I recommend everyone to attend this course whether your business is at the beginning or whether you have already implemented some of the IT security procedures
Network Engineer,
Christ the King Sixth Form Colleges London
Find out more about our one day public courses or internal workshops, please complete the form below.
© 2022 Cyber Management Alliance.