Creating A Playbook

Download our detailed workflow on creating a cyber incident response playbook

create-playbook

Download our 'Creating a Cyber Incident Response Playbook' Workflow

Easy-to-follow workflow on creating effective & simple-to-use cyber incident response playbooks. 

There is little room for error during a cyber-attack and your staff, technical and managerial, must have access to easy-to-follow actions during and after an attack to ensure that your organisation comes out unscathed.  Atul Gawande puts it brilliantly in his book, The Checklist Manifesto:  How To Get Things Right...

"Avoidable failures are common and persistent, not to mention demoralizing and frustrating, across many fields—from medicine to finance, business to government. And the reason is increasingly evident: the volume and complexity of what we know has exceeded our individual ability to deliver its benefits correctly, safely, or reliably. Knowledge has both saved us and burdened us."

 This workflow, taken from our  NCSC-Certified Cyber Incident Planning and Response  course, shares the basics that you need to know about creating a cyber incident response playbook.  

Do note that the majority of cybersecurity standards such as ISO 27001, ISO 22301, PCI DSS recommend organisations to develop a Data Breach or  Cyber Incident Response Plan. 

** GDPR & Privacy ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.

enter your details below to get your copy:

cyber-essentials-certification
NCSC Certified Logos B&W
CSC

We are industry experienced practitioners when it comes to cyber security training & cyber security consultancy services

1487652208_graduationcap

Training

We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop

1487652846_microphone

Virtual CISO and DPO

Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations

1487652784_calendar-3

Events

We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.

1487652701_like

Cyber Essentials & ISO27001

Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements

1487652632_search

Third Party Assessments

With the ever increasing dependency on outsourcing it isimperative for businesses to manage risks posed by third parties. Leaving the backdoor unlocked is simply not an option.

1487652567_line-chart

Security Gap Assessments

We offer GAP assessments against most frameworks and accreditation including Information Security, PCI-DSS, Data Privacy and Cyber Incident Response

How we use your data:

  • The form above collects personal information so we may email you the requested information and pressing the "Get your free copy now" or the "Download your mind map"  button acts as informed consent for this processing purpose. Consequently we may be in touch to:

    • Update you when we host our ground-breaking Wisdom of Crowds events in your country or region.
    • Keep you posted on free resources and documents around Wisdom of Crowds events and its outputs. (For example, we tend to create insightful mind maps and we also are the creators of free to view Insights with Cyber Leaders Video Interviews. )
    • Inform you about upcoming and FREE educational webinars on GDPR and Cybersecurity.
    • Inform you of upcoming courses including Data Breach Response or Cyber Incident Response training.
    • Offer you advisory and support on achieving cybersecurity and privacy.     
  • In its purest interpretation, this act of us communicating with you is direct marketing and is processed on the basis of our legitimate interest and your engaging in our services. All marketing communication will include an unsubscribe button or other method of ending communication.

Download the Data Breach Response Mind Map Today

A GDPR resource to help you create a defined data breach response process. 

download template