Organisations continue to suffer from external and internal attacks yet Cyber Incident Management is an afterthought in most companies. This course will enable you to prepare a defined and managed approach when responding to a data breach or attack of an information asset. The content is intended for senior management and business executives who wish to gain a better understanding of incident response or are responsible for helping organizations plan and prepare for potential cyber threats and effectively deal with actual cyber-attacks. This is not a technical course therefore there are no prerequisites.
TRAINING AT YOUR SITE
Guaranteed to RunWhen you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.
There are no formal prerequisites for this course.
Before the Incident Mind Map underpin an effective breach ready
After the Incident Mind Map organisation.
The Cyber Kill Chain
Log Data Analysis
Press Interview Scenarios
Crisis Comms Plan
Client and PR Communication Templates
Threat Actors in Detail
Threat Agents Intent & Attributes
Detection and Response Strategies
What is incident orchestration
Using incident orchestration to significantly reduce time to - respond to data breaches
How to semi-automate and fully automate incident management
Using incident orchestration to empower and up skill existing staff
Incident orchestration as Force Multiplier
Using orchestration to increase compliance to - Forensic Principles regulations like GDPR - Seizing Evidence
Identifying Critical Systems and Assets
Understanding and Building the Organisational Baseline
Interactive session on applying these principles
Strategies in understanding operational weaknesses
Defining high level cyber response process workflows
Understanding the technologies that underpin an effective breach ready organisation
Analysis of core technology requirements
Methods of Attack
Analysis of the Cyber Kill Chain
Review of Recent High Profile Attacks
Strategies to counter the Cyber Kill Chain
The Golden Hour
Creating/ adopting the checklist
Incident management checklist
Using the check list to beat the hackers!
Detailed why and how
Actionable Threat intelligence
Crisis Comms Plans Management
Social Media & PR Key Steps
PR Case Study
Stakeholders - Who are they?
Legal, Compliance and Notifications
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want, including online training.