background chain
home-image
ARM AGAINST
Disruption

Attack

Failure

ABOUT US
about-image
What we do

The rapidly growing number of cyber-threats highlight not just an organisation’s ability to plan and protect, but the skill of management at senior board level to react in an informed and positive manner if a security breach occurs.

ExCyb is a new organisation started by former senior police officers with many years of substantial strategic crisis management in multiple fields including civil unrest, terrorism and cybersecurity. This experience has been distilled into a new training programme that will provide bespoke modules that focus on specific cybersecurity threats to an organisation.

This turnkey approach delivers real-life immersive scenario-based learning. It will help leaders understand the challenges of managing a range of levels within different crises. The incidents are developed in live time and are made realistic with bespoke video footage that raises the realism of what colleagues might face. It starts with a relatively minor issue that builds into a full crisis. This includes many problems including public concern, media intrusion, stakeholder management, shareholder management, business continuity planning, preparedness, policies, procedures, resilience, team dynamics and tensions under pressure.

We provide a bespoke approach that ensures each client receives precisely the right training dictated by their individual needs.

For further information, download our brochure.


OUR TEAM

Adam Briggs
Stuart Hyde
Meredydd Hughes
Nick Croft
Russ Jordan
Kevin Tea
NEWS

BA, Marriott Face Massive Fines For Data Loss


If proof was needed that poor data protection is bad for the corporate wallet, two examples have demonstrated that substantial fines face those organisations that have lax data security.

read more

Cumbria First Police Force To Utilise NMC Tools


Cumbria Constabulary has become the first police force to use the National Management Centre (NMC) for cybersecurity set up under the National Police Chiefs’ Council (NPCC).

read more

Phishing Attacks Bypassing 2-Factor Authentication


Penetration testers and attackers have a new tool in their arsenal that can be used to automate phishing attacks in a way that defeats two-factor authentication (2FA) and is not easy to detect and block, reports CSO Magazine.

read more

Third of Breaches Caused By Unpatched Vulnerabilities


IT security professionals have admitted that a third of cybersecurity breaches are the result of vulnerabilities that they should have patched.

read more
GOT A QUESTION FOR US?

twitter linkedin