Download and review our workflow on Identifying Threat Actors
You need to know who is out to harm your business. Cyber adversaries are many and you must have a clear understanding of who the attackers are and how they operate. This workflow is inspired by Sun Tzu's treatise 'The Art of War' and suggests the following:
This workflow, taken from our NCSC-Certified Cyber Incident Planning and Response course shares ideas on how to identify cyber threat actors or cyber adversaries who can cause irreversible damage to your bottom-line and to your business reputation.
Do note that the majority of cybersecurity standards such as ISO 27001, ISO 22301, PCI DSS recommend organisations to develop a Data Breach or Cyber Incident Response Plan.
** GDPR & Privacy ** We wholeheartedly believe your and our rights to privacy and in the GDPR. The bottom of the page explains how we use your data.
We offer a host of courses including our GCHQ Certified Cyber Security & Privacy Essentials (CSPE) course and our Cyber Incident and Response Planning (CIPR) workshop
Our virtual CISOs and DPOs are industry thought leaders and have several years of experience in cyber security and data privacy working with small, medium and large organisations
We work with event organisers from around the world to create engaging cyber security events. Our pool of keynote speakers are carefully chosen and are recognised global industry leaders.
Acquiring an accreditation is often a daunting and complicated task. We work with you to ensure that your business is ready for any and all compliance requirements
A GDPR resource to help you create a defined data breach response process.
download template