Newsletter | Volume 1

Issue I
Issue II
Issue III
Issue IV
Issue V
Issue VI
Issue VII
Issue VIII
Issue IX
Issue X
Issue XI
Issue XII
Issue XIII
Issue XIV
Issue XV
Issue XVI
Issue XVII
Issue XVIII
Issue XIX
Issue XX

click here to

Subscribe to our newsletter



To Unsubscribe click here

Are you prepared if there is a cyber-incident?

Cyber incidents are like wargaming exercises. Going thru the components, process and the mechanisms of a mock cyber attack needs a game plan. Cyber and IT security crises include a unique number of unknowns of malware, vulnerabilities, cybercrime, hacking, and cyber attacks.

Prepared for a significant computer breach
Most often security and IT employees typically are trained in dealing with violations. Managers and employees in other departments are often not always ready to respond. A security breach or big data loss most often triggers an emergency for the entire organisation, business; a is not limited to the IT or security teams. Therefore during the workshop we will do a role play with different positions and profiles from multiple departments so that they know their responsibilities and how to react quickly and efficiently in such situations. Just like a fire drill exercise!

A cyber incident now happens faster and causes more damage than before. A cyber incident now happens faster and causes more damage than before.The primary purpose of this exercise is to prepare your organization for when a significant computer breach hits them. The participants include both executives and rank and file positions to prompt all employees in the organization to make the right decision.

The primary components of a mock scenario
Often only security and IT staff are aware of the probability of cyber crimes and are trained to react quickly and efficiently should one occur. Other business departments of an organization get the information in the canteen and are not usually as aware of what their roles in such a scenario.

The workshop is an exercise in crisis and risk management. It should include managers for security, IT, finance, marketing and legal, as well as the CEO. We create a mock scenario in which an attacker has successfully hacked into the corporate network; The primary component is to develop a response and recovery plan. New pieces of information are provided as the cyber attack advances that include mock media reports and investigation results in a story telling format.

The plans must be formulated quickly, with a limited amount of information to make vital decisions
We can also customise the details of a mock attack in the organization in cooperation with your IT ans Security Department. A typical scenario being that unknown attackers have broken into the systems of a fictitious company and posted on the company website profiles of 200,000 clients and users. Media and competitors are on the spot. The participants must figure out all the steps the company needs to take, post-intrusion, restore normal operations, go thru a business communication and interruption plan and how to avoid an attack in the future.

Other secondary issues and components in the exercise are to find out the source of how the breach and information leak took place and correcting the problem. Drafting a media message, contacting all stakeholders, including employees and reassuring customers.
  • How to ensure that the organisation takes the breach seriously and review the legal aspects of business partners, manufacturers and banks to avoid any legitimate followup.
  • Training, readjusts budgets, inventory levels and the response to the board of directors, who are also responsible that cyber security issues are addressed.