This Mind Map is a Component of the GCHQ Certified Cyber Incident Planning & Response course. 

Thank you for your interest in our Before the Incident Mind Map. Please click on the image below to download the PDF. This Mind Map is an example and during our GCHQ Cyber Incident Response Planning (CIPR) workshop in which we assist organisations to develop their own bespoke Mind Maps and Checklists.

For further information on the CIPR training/workshops please click here. 

CIPR_BTIMM_Small.jpg 

 CIPR_Before_the_Incident_Mind_Map

Cyber Incident Response & Planning Training 

CIPR Training attendees will understand:

  • The latest techniques and insight on incident response.
  • Threat Intelligence led testing and response framework adopted by leading governments and institutions.
  • Identification, Exfiltration or Manipulation of Data Balance of identification, exfiltration vs. manipulation. Pre-attack Research, Reconnaissance and Target Selection.
  • Planning and Preparation of Attack Components.
  • The business impacts of cyber breaches and real-world cyber attacks
  • Infiltration and Post-Infiltration Entrenchment.
  • SIEM, Analytics & Entity based anamoly detection and how to use it for effective response.
  • Design an early warning system to lower discovery time from months to days Create actionable plans & checklists to use today.
  • Understand, define and baseline “Normal” within your organisation.
  • Stop up to 90% of all cyber attackers in their tracks and before they breach your critical data.
  • Design and implement a response framework and build an effective cyber response team.
  • Secrets of managing TV reporters and media journalists.
  • The “golden hour” and why it’s critical to managing an incident.
  • Threat intelligence and how to use this knowledge to create an effective incident plan.
  • Latest techniques in ZERO­Configuration SIEM and relevance to detecting anomalous behaviour.
  • Basic application of incident triage, OODA and the Diamond Methodology.
  • Deep dive into Cyber Kill Chain.
  • Analyse recent attacks and learn how these attacks avoided detection.

"Amar Singh brings a wealth of personal experience and knowledge"
Hariprasad Chede - President, ISACA UAE Chapter

"I wish all Senior Executives attend this course. It’s the most practical course I have ever attended. It teaches you not just how to understand but also how to respond to a Cyber Attack."
K.S.Ramakrishnan - CRO, Rakbank

Cyber Incident Planning & Response Brochure Download

Footer Top Background Image
Simply fill in your details to request a FREE callback