Cyber Incident Management Training is a must!

Posted on 26 September

Deloitte hit by cyber-attack revealing clients' secret emails. 

Hackers may have accessed usernames, passwords and personal details of top accountancy firms' blue-chip clients. Read more here.

At PlanB one of our Crisis Management Services is 'Cyber Incident Management'. We can provide your organisation with the skills to manage the response to a cyber incident.

In this digital world, we now all operate in it is crucial for companies (large and small) to be prepared for managing the external response to a 'hack' of their systems.

Our Director Charlie MacLean-Bristol recently led a "Managing and preparing for cyber incidents" public course. This course is managed by Business Continuity Training, PlanB Consulting's sister company.

This course covers the following topics:

Subject Area

Details

Introductions

Introductions

Module 1 - Cyber incident landscape and threats

  • Number of cyber case studies
  • What are the different types of cyber threats?
  • Who are the threat actors?
  • What are the threat vectors
  • Cyber incident impacts
  • Regulatory framework and organisations involved in cyber response
  • What different (and the same) about cyber incidents compared with other crisis events.

Break

 

Module 2 - Prepare

 

  • Understating your organisations vulnerability and level of preparedness
  • Reviewing and developing your cyber policy and guidance
  • Developing a cyber playbook
  • Incident escalation
  • Developing or adding to your existing crisis management plan
  • Cyber insurance and choosing the right cyber technical partner

Lunch

 

Module 3 - Response

  • Recognising a cyber incident
  • Managing a cyber incident – react – respond - resolve
  • Reporting to regulatory bodies
  • Ransomware, pay or not to pay?
  • Managing your organisation communications with customers, stakeholders and the media
  • Working with IT and specialist contractors
  • Cyber incidents and the law

Break

 

Module 4 – Exercise your cyber incident plan

  • Different types of exercises
  • Simulating the threat
  • Making exercise realistic
  • Hints and tips for successful exercises

Course review