Bouton d'appel

Cyber Incident Planning & Response

clockDuration

1 day

Course starts at 9h00 and ends at 17h00.

euroPrice

699€ Price is vat inclusive.

date

Date

Brussels, Av. Louise 66
Thursday 8th May 2018.

book-now

Strategies in Planning & Responding to Cyber Attacks

Is your organisation prepared to respond to a data breach?

  • Is your organisation ready to deal with regulators after a data breach?
  • Are you able to comply with GDPR breach notification requirements?
  • Are you able to measure your organisation's breach readiness?

By including a Cyber Incident Response Plan in your GDPR preparation roadmap, it will demonstrate to the regulators that you have the policies, procedures and planning in place to swiftly respond to a data breach or cyberattack.

This course will enable you to prepare a defined and managed approach when responding to a data breach or cyberattack of an information asset. The content is intended for senior management and business executives who wish to gain a better understanding of incident response or who are responsible for helping organizations plan and prepare for potential cyber threats, and effectively deal with actual cyberattacks. This is not a technical course therefore there are no prerequisites.

Course & Learning Objectives

  • Gain deeper insights on key risk-reducing controls to increase your company's ability to protect. detect and respond to cyber-attacks- on a strategic and operational level.
  • Learn to design an early warning system to lower discovery time from months to days.
  • Develop the skills to understand and improve your company's cyber-resiliency by making more cost-effective, risk-based decisions.
  • Gain an understanding of crisis communications. media management and how to communicate with clients, employees and journalists.
  • Learn how to integrate with and benefit from an information risk management approach to incident management.
  • Discover the "golden hour" and its significance in effective incident management.
  • How to use threat intelligence and international frameworks to create a robust and effective incident response plan.
  • Orchestration in Incident Management: Understand its significance. Participants create their own incident management orchestration playbook.
  • Working together. create usable collateral you can put to use immediately to improve your detection and response capabilities.
  • Discover why risk based profiles of cyber attackers matter in cyber-resiliency and how to create these.
  • Understand the application of incident triage. OODA and the Diamond Methodology. Drill down into the Cyber Kill Chain process.

Course Outline:

Interactive Croup Activities

  • Breach notification Templates
  • Before the Incident Mind Map
  • After the Incident Mind Map
  • Checklists
  • Crown Jewels
  • Process Workflows
  • The Cyber Kill Chain
  • Go Destroy
  • Log Data Analysis
  • Press Interview Scenarios
  • Crisis Communications Plan
  • Client and PR Communication Templates

Understanding Threat Actors

  • Threat Actors in Detail
  • Threat Agents Intent & Attributes
  • Detection and Response Strategies

Automating Incident Management & Response 

  • What is incident orchestration
  • Using incident orchestration to significantly reduce time to - respond to data breaches
  • How to semi-automate and fully automate incident management
  • Using incident orchestration to empower and up skill existing staff
  • Incident orchestration as Force Multiplier
  • Using orchestration to increase compliance to regulations like GDPR

Defining Normal 

  • Identifying Critical Systems and Assets 
  • Understanding and Building the Organizational Baseline
  • Interactive session on applying these principles
  • Strategies in understanding operational weaknesses
  • Defining high level cyber response process workflows

The Technologies 

  • Understanding the technologies that underpin an effective breach ready organization
  • Analysis of core technology requirements

The Cyber Kill Chain 

  • Methods of Attack 
  • Analysis of the Cyber Kill Chain
  • Review of Recent High Profile Attacks
  • Strategies to counter the Cyber Kill Chain

Triage. Detection & Monitoring 

  • OODA Loop 
  • The Golden Hour
  • Log Management

The Checklist 

  • Creating/ adopting the checklist 
  • Incident management checklist
  • Using the check list to beat the hackers!

Intelligence Led Incident Response 

  • Detailed why and how 
  • Actionable Threat intelligence

Forensics & Investigations 

  • Integrity 
  • Forensic Principles
  • Seizing Evidence

Public Relations 

  • Crisis Communications Plan Management 
  • Social Media & PR Key Steps
  • PR Case Study
  • Breach notification

Building the Team 

  • Stakeholders - Who are they? 
  • Legal, Compliance and Notifications.

About the course creator and trainer Amar Sinch

  • UK Government GCHQ certified trainer and creator of GCHQ certified courses.
  • Experienced cyber, information security and data privacy practitioner.
  • Global Chief Information Security Officer, expert in information risk management.
  • Mentor and trusted advisor to FTSE 100 Firms.

book-now

Mijn winkelmand

Uw winkelmand is leeg

facebooklinkedintwitter