Cyber Breach Workshop
The Cyber Breach Workshop can now be delivered as a virtual experience, with all the elements of the real life workshop. Fully interactive, and with exercises played out in ‘real time’, you will emerge with a playbook template for various threats, a RACI matrix defining roles and responsibilities, and detailed workflow templates; even sample communications for the press and your customers.
Be prepared to be taken outside your comfort zone. You can attend as an individual on behalf of your organisation, but we can also tailor the event just for your organisation, with up to eight attendees. The workshop is suitable for non-technical personnel such as MDs, FDs, Heads of HR, PR, Comms as well as IT and security people. Here’s what we will cover…
Vital considerations prior to defining your plan including;
- Readiness assessment
- Staff awareness,
- Leadership buy-in
- As close to 100% asset visibility as possible
- Roles and responsibilities are defined
- 3rd party support arranged and tested
Not only what to say, but who says it, who approves the messages and when do we actually communicate if at all?
Developing a structured breach response workflow, documenting escalations and tied in to you existing incident management processes.
Your experienced cyber breach expert instructors will help you understand your top risks and show you how to define a scenario add-on for each.
You will work through FOUR full scenarios step by step –
- Credentials Attack/Stuffing
- Data Leak
Book your place now, only £595 per person (excl. VAT)!
Register interest or redeem a Golden Ticket:
“IP Performance have worked as a trusted networking and cyber security partner with SCCB for many years. I highly recommend IP Performance. The team are highly responsive and extremely knowledgeable. Their networking and security solutions provided to us are well designed to meet our specific needs and the pricing is always very competitive. I have full trust in IP Performance to help us keep our IT systems at SCCB resilient, efficient, and secure.”Dave Birks, IT Services,
South and City College Birmingham