Duration
1 day
Course starts at 9h00 and ends at 17h00.
Price
699€ Price is vat inclusive.

Date
Brussels, Av. Louise 66
Thursday 8th May 2018.

Strategies in Planning & Responding to Cyber Attacks
Is your organisation prepared to respond to a data breach?
- Is your organisation ready to deal with regulators after a data breach?
- Are you able to comply with GDPR breach notification requirements?
- Are you able to measure your organisation's breach readiness?
By including a Cyber Incident Response Plan in your GDPR preparation roadmap, it will demonstrate to the regulators that you have the policies, procedures and planning in place to swiftly respond to a data breach or cyberattack.
This course will enable you to prepare a defined and managed approach when responding to a data breach or cyberattack of an information asset. The content is intended for senior management and business executives who wish to gain a better understanding of incident response or who are responsible for helping organizations plan and prepare for potential cyber threats, and effectively deal with actual cyberattacks. This is not a technical course therefore there are no prerequisites.
Course & Learning Objectives
- Gain deeper insights on key risk-reducing controls to increase your company's ability to protect. detect and respond to cyber-attacks- on a strategic and operational level.
- Learn to design an early warning system to lower discovery time from months to days.
- Develop the skills to understand and improve your company's cyber-resiliency by making more cost-effective, risk-based decisions.
- Gain an understanding of crisis communications. media management and how to communicate with clients, employees and journalists.
- Learn how to integrate with and benefit from an information risk management approach to incident management.
- Discover the "golden hour" and its significance in effective incident management.
- How to use threat intelligence and international frameworks to create a robust and effective incident response plan.
- Orchestration in Incident Management: Understand its significance. Participants create their own incident management orchestration playbook.
- Working together. create usable collateral you can put to use immediately to improve your detection and response capabilities.
- Discover why risk based profiles of cyber attackers matter in cyber-resiliency and how to create these.
- Understand the application of incident triage. OODA and the Diamond Methodology. Drill down into the Cyber Kill Chain process.
Course Outline:
Interactive Croup Activities
- Breach notification Templates
- Before the Incident Mind Map
- After the Incident Mind Map
- Checklists
- Crown Jewels
- Process Workflows
- The Cyber Kill Chain
- Go Destroy
- Log Data Analysis
- Press Interview Scenarios
- Crisis Communications Plan
- Client and PR Communication Templates
Understanding Threat Actors
- Threat Actors in Detail
- Threat Agents Intent & Attributes
- Detection and Response Strategies
Automating Incident Management & Response
- What is incident orchestration
- Using incident orchestration to significantly reduce time to - respond to data breaches
- How to semi-automate and fully automate incident management
- Using incident orchestration to empower and up skill existing staff
- Incident orchestration as Force Multiplier
- Using orchestration to increase compliance to regulations like GDPR
Defining Normal
- Identifying Critical Systems and Assets
- Understanding and Building the Organizational Baseline
- Interactive session on applying these principles
- Strategies in understanding operational weaknesses
- Defining high level cyber response process workflows
The Technologies
- Understanding the technologies that underpin an effective breach ready organization
- Analysis of core technology requirements
The Cyber Kill Chain
- Methods of Attack
- Analysis of the Cyber Kill Chain
- Review of Recent High Profile Attacks
- Strategies to counter the Cyber Kill Chain
Triage. Detection & Monitoring
- OODA Loop
- The Golden Hour
- Log Management
The Checklist
- Creating/ adopting the checklist
- Incident management checklist
- Using the check list to beat the hackers!
Intelligence Led Incident Response
- Detailed why and how
- Actionable Threat intelligence
Forensics & Investigations
- Integrity
- Forensic Principles
- Seizing Evidence
Public Relations
- Crisis Communications Plan Management
- Social Media & PR Key Steps
- PR Case Study
- Breach notification
Building the Team
- Stakeholders - Who are they?
- Legal, Compliance and Notifications.
About the course creator and trainer Amar Sinch
- UK Government GCHQ certified trainer and creator of GCHQ certified courses.
- Experienced cyber, information security and data privacy practitioner.
- Global Chief Information Security Officer, expert in information risk management.
- Mentor and trusted advisor to FTSE 100 Firms.
