Course delegates will be given an outline of what a Cyber Breach Response Plan contains, what it aims to achieve, what the important questions need to be asked and who needs to engage with the plan. Your objectives:
Communications and initial work streams
Mobilizing the plan
3rd Party Supply Chain Management
Group Exercise: Plan your own table-top exercise for your company
An exciting, insightful and captivating climax to the day. With each course delegate playing a key role, the group will undergo a simulated, accelerated real-time incident complete with the ‘twists and turns’ of real life scenarios, arming you with the necessary experience and tools to conduct your own dry-run/plan testing and to give you a great level of confidence that you can avoid some of the common mistakes in breach handling. Q & A
Certificate Distribution with Ending Ceremony
Phil is regarded as one of Europe’s leading information security experts. He has held several CISO (Chief Information Security Officer) roles spanning five different industry sectors.
With over 28years’ experience gained in a variety of high-profile technology and security management roles, he offers a unique insight to the world of information security, cyber-threats, and risk management. He is a regular speaker at UK, Middle Eastern and European conferences. As national publicity on the subject of ‘Wireless security’ peaked in 2002, Phil became somewhat of a cyber-security celebrity with appearances on Sky TV, BBC News and in national and industry press. Phil remains highly technical with a hands-on security capability not normally present with someone of his seniority in the industry.