Displaying out of 42
Easy to understand guidance on Cyber Incident Planning & Response
One of the key artefacts you need to produce as part of your planning for responding to a cyber attack is a Cyber Incident Response Plan. A document that guides you on what actions to take and how to take those actions.
Created at our flagship Wisdom of Crowds events.
This list contains the top Cyber Security Tabletop Exercise Scenarios that you must rehearse. It also contains crowdsourced knowldge on the top Asset Categories that you must prioritise and the biggest Threat Actors to watch out for.
For A Defined Response To Cyber Attack/Data Breach.
Our Data Breach or Cyber Incident Action checklist will help you prepare and plan a defined response to a cyber attack or data breach.
Are you thinking of running a cyber scenario tabletop exercise to test your existing incident response plans and procedures?
Download our Cyber Crisis Tabletop Exercise (CCTE) checklist and ensure you have thought about all the different aspects of running a successful tabletop exercise.
Free 9-step ransomware prevention checklist.
Download our ransomware prevention checklist to boost your ransomware readiness.
Download this free NIST Incident Response Playbook Template
Looking to create a NIST-based Security Incident Response Playbook for your organisation? Don't know where to start? Look no further than our FREE, downloadable and easy-to-customise NIST Incident Response Playbook Template.
Free Ransomware Response Guide
Free, no-nonsense ransomware response guide on what to do when you’ve been hit by a ransomware attack.
An informational visual timeline of the attack.
Disney suffered a massive data breach, leaking over 1.1 terabytes of sensitive information from their internal Slack channels. The breach exposed confidential data related to Disney Cruise Line crew members and theme park guests, including personal information such as addresses, birth dates, and passport numbers.
Download this free NIST Incident Response Playbook Guide
Our cybersecurity experts have now created this comprehensive guide which shows you how to create your own NIST Incident Response Playbook. This Guide contains all the expert insights, tips and suggestions you need straight from our trainers & experts who have also assisted several organisations in significantly improving their Incident Response capabilities, including through the use of effective IR Playbooks.
Improve the Likelihood of Better Cyber Insurance Premiums.
Cyber attacks are unbelievably costly to indemnify and the costs obviously get translated into higher cyber insurance premiums. But there are steps that you can adopt today to improve your chances of negotiating a better cyber insurance premium on your policy.
Download our FREE Ransomware Incident Response Checklist.
Easy, non-technical ransomware incident response checklist on how to respond to a ransomware attack
Your Checklist on Ensuring You are Ready for a Cyber Crisis.
Download our Preparing for a Crisis checklist and ensure you have thought about all the different aspects of managing a cyber crisis.
A Simple, Non-Technical Checklist To Help You Prepare For Cyber Essentials
Why Cyber Essentials & How Do I Prepare for Cyber Essentials? This Checklist answers both these fundamental cybersecurity questions.
How we can help you negotiate better Cybersecurity Insurance Premiums
This document contains a list of 10 specific services rendered by Cyber Management Alliance which can not only help you achieve greater cyber resilience but also improve your chances of lowering your cyber insurance premiums.
An easy to understand, to-the-point checklist covering various aspects of working remotely.
In this PDF, we cover guidelines on topics including: Cybersecurity Privileged Users, Online meetings, GDPR & Privacy, Backups and more
Review our detailed workflow on creating a cyber incident response playbook
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course, shares the basics you need to know to create a cyber incident response playbook.
The Need for Common Taxonomy During a Cyber Attack
How do you communicate during the Golden Hour of a Cyber Attack? Download our Data Breach Definition document to find out. This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course discusses the concepts of taxonomy and the need to standardise communication channels during a cyber attack
Learn how to Identify Cyber Threat Actors who are out to harm your business
Learn how to Identify Cyber Threat Actors out to harm your businessThis workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course shares ideas on how to identify cyber threat actors or cyber adversaries that you can use to create your own Threat Actor Library.
Review this mind map before you create your attack scenarios
Having a cyber incident response plan without an attack scenario is like getting into a car and driving aimlessly. You need to know your final destination. This mind map, taken from our NCSC-Certified Cyber Incident Planning and Response course, points out the various components you need ready before you build your attack scenario.
Wisdom of Crowds
Crowd-Sourced PDF contains a number of checklists including:Physical SecurityGovernance & ComplianceIncident Response and Availability
Download our Data Breach Response Plan Mind Map Today
This mind map, taken from our NCSC-Certified Cyber Incident Planning and Response course, outlines several areas that an organisation must focus on to be GDPR breach ready.
An informational visual timeline of the attack.
We study and analyse cyber and ransomware attacks to create informational visual timelines.For the Royal Mail Ransomware Attack, we have created a visual timeline and an accompanying detailed report. Download it now
There is no time during a cyber-attack. Use our 60 Second 10 points checklist to cover all your bases. This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
An informational visual timeline of the attack.
An informational visual timeline of the the Solarwinds cyberattack, we have created a visual timeline and an accompanying detailed report.
An informational visual timeline of the attack.
American Mortgage Lending Giant, Mr. Cooper, was hit by a cyber attack towards the end of last year. The company had to shut down IT systems including access to their online payment portal, creating quite a ruckus amongst customers who were unable to make their payments on time. In about a week, however, the company managed to bring its payment facility online.
Before you do tear up your current incident response plan, take a look at our simple 5 points to consider and get right when creating a response plan.This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course.
An informational visual timeline of the attack.
On June 4, 2024, the NHS UK declared a 'Critical Incident' following a cyber-attack on its pathology services provider, Synnovis. This attack, orchestrated by the Qilin Ransomware Gang, resulted in cancelled operations and the diversion of emergency patients. Additionally, the attackers leaked 400 GB of sensitive personal data and attempted to extort Synnovis for money.
An informational visual timeline of the attack.
The ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group, began on February 21, 2024, disrupting services across U.S. healthcare providers and pharmacies. Eventually, the attack became a lesson in how attacks on healthcare companies can have seriously damaging and cascading effects. It also highlighted why ransom payments are NEVER a solution.
An informational visual timeline of the attack.
We scrutinize past cyber-attacks, ransomware attacks and data breaches to understand the tactics, techniques and procedures most commonly used by threat actors. Download our 23andMe Cyber Attack Timeline today.
An informational visual timeline of the attack.
The UK Ministry of Defence (MoD) faced a significant cyber attack through a third-party payroll system, leading to severe repercussions. The breach exposed sensitive data of 270,000 personnel, including active service members, reservists, and veterans from all three branches of the armed forces. This incident has sparked considerable political controversy and highlighted the critical importance of third-party cybersecurity measures.
An informational visual timeline of the attack.
For the Western Digital Cyber Attack, we have created a visual timeline and an accompanying detailed report. Download it now.
An informational visual timeline of the attack.
The massive Snowflake cyber attack has impacted companies such as Pure Storage, Ticketmaster, and Advance Auto Parts. Hackers themselves have suggested that at least 400 organisations may have been compromised by this attack.
An informational visual timeline of the attack.
Incident Response is our passion and we study and analyse cyber-attacks to create an informational visual timeline of attacks. For the Travelex cyberattack we have created a visual timeline and an accompanying detailed report.
An informational visual timeline of the attack.
Another informational visual timeline of an attack. For the Easyjet cyberattack, we have created a visual timeline and an accompanying detailed report.
Wisdom of Crowds
Checklist to ask your Third Parties and record-keeping requirements (Controllers and Processors). Over 60 Contributors from organisations including the European Data Protection Supervisor, ING, BAE Systems, Verizon and many others.
An informational visual timeline of the attack.
For the Barracuda Email Security Gateway Hack, we have created a visual timeline and an accompanying detailed report. Download it now.
Everything you wanted to know about GDPR but was afraid to ask
Practitioners, specialists, thought leaders and experts in cybersecurity and data privacy have worked together to co-author a book on GDPR. We present Wisdom of Crowds's first collaborative e-book.
An informational visual timeline of the attack.
AT&T experienced a massive data breach. Earlier estimates suggested that roughly 73 existing and former customers had their data compromised. The company later confirmed that the actual number was 51 million.
An informational visual timeline of the attack.
In May 2024, Ascension Health, one of the largest U.S. healthcare systems, fell victim to a ransomware attack. The breach severely impacted hospital operations across multiple states, disrupting Ascension’s electronic health record (EHR) system MyChart.
An informational visual timeline of the attack.
For the AIIMS Ransomware Attack, we have created a visual timeline and an accompanying detailed report. Download it now.
Wisdom of Crowds
Checklists covering various topics including: Data Controller, Checklist, CISO Checklist, DPO Checklist and our GDPR Mind Map
Multiple Documents and Checklists
A free GDPR preparation kit containing items such as: GDPR template emails and letters, Breach registers, FREE GDPR Training course.