Business Processes, Operational Strategies & Best Practices for Responding to a Data Breach
We have trained over 750 organizations including:
Cyber Management Alliance is a UK-registered cybersecurity training provider and trusted advisor to private and public sector organisations.
Cyber Management Alliance (CM-Alliance) provides its clients with a broad portfolio of strategic and operational cybersecurity services including the NCSC-Certified Cyber Incident Planning & Response (CIPR) Breach Readiness Programme.
The key focus of the CIPR Programme is to enable clients:
Throughout this programme, we work with all stakeholders in the business to create and adopt a set of strategies, policies and technologies to ensure that the organisation is aligned and compliant with the GDPR’s breach notification requirements.
By including a Cyber Incident Response Plan in your GDPR preparation road-map, you will demonstrate to the regulators that you have the policies, procedures and planning in place to swiftly respond to a data breach or cyber-attack.
This two-day workshop will enable you to prepare a defined and managed approach when responding to a data breach or cyber-attack of an information asset. The content is intended for senior management and business executives who wish to gain a better understanding of incident response or who are responsible for helping organisations plan and prepare for potential cyber threats, and effectively deal with actual cyber-attacks. This is not a technical course, therefore, there are no prerequisites.
This cybersecurity training course provides senior management and incident response teams with the vital processes, knowledge and skills to lead and manage a cyber crisis. The course is designed for senior management involved in responding to a cyber or data breach across an organisation, including staff involved in:
This training is available as a one-day public course or a two-day internal workshop.
Launched in October 2016, the NCSC or National Cyber Security Centre is headquartered in London and brings together expertise from CESG (the information assurance arm of GCHQ), the Centre for Cyber Assessment, CERT-UK, and the Centre for Protection of National Infrastructure.
The NCSC-Certified training is designed to assure high-quality training courses delivered by experienced training providers. The courses are assessed at two levels, namely, awareness and application.
This course has been certified for the application level of incident response in the areas of Risk Assessment, Business Continuity Planning and Incident Management. The Application level is for anyone looking for in-depth courses for their professional development.
The Chartered Institute of Information Security (CIISec) is the only pure-play information security institution to have been granted Royal Charter status and is dedicated to raising the standard of professionalism in information security. CIISec represents professionalism, integrity and excellence within the information and cybersecurity sector.
The NCSC-Certified Training and the Chartered Institute of Information Security's (CIISec) accreditation enables organisations to distinguish between reputable courses and ones that have not been validated using a Government-endorsed assessment process.
Directly download the complete Learning Objectives PDF of the NCSC-Certified Course here.
Benefits of arranging an internal exclusive private workshop include, but not limited to:
All online and public students receive numerous takeaways including immediately usable cyber response checklists, templates like cyber response plans and workflows that you can put to use in your organisation immediately.
This module starts by emphasising the importance of asking the question - WHY? Why would an attacker attack your organisation? It delves briefly into the psychology of attacks and builds the foundation for Module 2. In addition, this module introduces the core concept of resiliency in the context of cyber. The module offers:
For full details on this and other modules click here.
Threat actors may sound daunting but fear not. After asking the question, “Why” in the first module, this cyber threat actor section discusses the importance of asking - WHO could damage your critical assets and consequently destroy your business. This section explains the importance of knowing details about your attacker(s) who could target your business. This module offers:
For full details on this and other modules click here.
Another key concept in the Cyber Incident Planning & Response course, Define Normal introduces the important idea of baselining or defining an organisational normal and explains its importance in building a cyber resilient business. It goes without saying, unless you can define and understand what’s normal for your digital network, it will be almost impossible to rapidly detect the abnormal. In this module, you will learn:
For full details on this and other modules click here.
Cyber criminals follow a process and have their own easy-to-follow attack methodology. In this module (also known as the cyber-attack process), we disclose the specific workflows that the majority of advanced and/or smart criminals utilise when they attack organisations and nation-states.
In these four modules, you will learn:For full details on this and other modules click here.
In this module, we introduce an important strategy - the concept that every business must focus on if it wants to increase its breach response and preparedness. The notion that if you stand in a dark room you are blind and oblivious to the surroundings may seem obvious, but this very fact is ignored and overlooked by organisations when planning and strategising on breach-readiness. In this module, students learn:
For full details on this and other modules click here.
The pivotal moment, the ‘golden hour’ and many other important concepts and strategies are discussed in this section.
For full details on this and other modules click here.
Building a great cybersecurity team also involves walking the tightrope between having a great internal team and liaising with external experts wherever necessary. In this module on Building the Team, students will learn:
For full details on this and other modules click here.
Forensics and evidence are often overlooked in cyber incident management. Many IT professionals don't have enough experience in handling evidence the right way. Dealing with a cyber-attack requires the ability to ensure chain of custody and ensure the evidence is captured, protected and processed in a way that it can be presented in court without anyone being able to challenge the integrity of that evidence. Delving further into this subject, in this module, we cover:
For the full details on this and other modules click here.
The actions that an organisation takes before, during and after an incident can have legal and or financial repercussions. It is imperative, therefore, that the management, IT and Security teams understand the regulations and standards that apply to them and have a well-defined set of policies to cover these regulations. In this module, we cover:
For full details on this and other modules click here.
It goes without saying that technology plays an extremely crucial role in all aspects of cyber incident response and management. The challenge is that most organisations have a messy and complex technology stack. A huge part of the objective of cyber incident planning and response is to evaluate your technology stack and ensure that it is optimised and ready for a cyber-attack. In this module, students will learn:
For full details on this and other modules click here.
The media is always on the lookout for juicy news and controversies. In case of a cyber incident in your organisation, you could be making the next set of headlines. What will you do when you’re in the news and your business and its security infrastructure is being scrutinised by the media? Do you have a PR strategy for when a security disaster hits? In this module, students will learn:
For full details on this and other modules click here.
Amar Singh has a long history and experience in data privacy and information security. Amar has served as CISO for various companies, including News International (now News UK), SABMiller, Gala Coral, Euromoney and Elsevier. Amongst various other activities, Amar is a Global Chief Information Security Officer and Trusted Advisor to a number of organisations including a FTSE100 firm, and is chair of the ISACA UK Security Advisory Group. He also founded the not-for-profit cybersecurity service for charities, Give01Day.
Amar has the highest integrity and is trusted by FTSE100 companies with some of the most sensitive commercial information. He has been involved with highly sensitive forensic investigations.
He has the ability to deal with both technically-astute, board-level executives and lead an organisation's information security direction. Apart from his experience and abilities, Amar holds a number of industry-recognised certifications, such as ISO 27001 Certified ISMS Lead Implementer, MoR, CRISC and CISSP certification.
Amar is an industry-acknowledged expert and public speaker and is regularly invited to speak and share his insights by some of the largest and most respected organisations in the world including The BBC, The Economist’s Intelligence Unit, The Financial Times, SC Magazine, InfoSec Magazine, Computer Weekly, The Register and the AlJazeera English Channel.
All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.
“I found the course to be very interesting. It not the usual bookish theoretical type, of course, it was quite interactive.."
CIO, Rak Bank, Dubai
“Amar Singh brings a wealth of personal experience and knowledge.”
President ISACA UAE
“The course was excellent. Not the typical core text book training but giving valuable insights and experiences.”
Head of IT, Bank of Sharjah, UAE
“This was the most interesting and attractive courses I have ever attended. A lot of inside knowledge was shared.”
Head of Audit, Emirate Global Aluminium, UA
"I wish all Senior Executives attend this course. It’s the most practical course I have ever attended. It teaches you not just how to understand but also how to respond to a Cyber Attack. ."
"The information we learnt provoked plenty of conversation both around personal experiences with the challenges that I face in the business and also backing up what was said in the course with real-life examples"
"The training was very informative and well knowledgable and i would recommend this course to anyone who wishes to explore cyber security even further."
IT Director, Christ the King Sixth Form Colleges London
"It’s been a great two days of learning. We drilled down, we simplified how an incident should be detected and how an incident should be handled. One of the key learnings I have taken is define normal. ."
"The overall training was good, it was quite informative. I highly recommend this training session to at least the CXO level people because it is something very meaningful for them and it can be very beneficial for organisations."
"Amar is a good mentor because he did more than just teaching. The checklist and mind maps are a really good part of the course. ."
IT Manager, HLB HAMT, Dubai UAE
"Amar is an excellent tutor and mentor also. The key aspects of the training is interactive sessions. Everyone has shared their experiences. I gained much knowledge which will be useful for my day to day activities."
"I really learnt a lot from this course as it was the first cyber security course I have been on. What I liked the most was the mind-mapping."
Paramount Computer Services, Dubai UAE
"I recommend everyone to attend this course whether your business is at the beginning or whether you have already implemented some of the IT security procedures. Even if you think you are protected but in fact it is not protected.."
Find out more about our one day public courses or internal workshops, please complete the form below.
© 2022 Cyber Management Alliance.