The rapidly growing number of cyber-threats highlight not just an organisation’s ability to plan and protect, but the skill of management at senior board level to react in an informed and positive manner if a security breach occurs.
ExCyb is a new organisation started by former senior police officers with many years of substantial strategic crisis management in multiple fields including civil unrest, terrorism and cybersecurity. This experience has been distilled into a new training programme that will provide bespoke modules that focus on specific cybersecurity threats to an organisation.
This turnkey approach delivers real-life immersive scenario-based learning. It will help leaders understand the challenges of managing a range of levels within different crises. The incidents are developed in live time and are made realistic with bespoke video footage that raises the realism of what colleagues might face. It starts with a relatively minor issue that builds into a full crisis. This includes many problems including public concern, media intrusion, stakeholder management, shareholder management, business continuity planning, preparedness, policies, procedures, resilience, team dynamics and tensions under pressure.
We provide a bespoke approach that ensures each client receives precisely the right training dictated by their individual needs.
For further information, download our brochure.
BA, Marriott Face Massive Fines For Data Loss
If proof was needed that poor data protection is bad for the corporate wallet, two examples have demonstrated that substantial fines face those organisations that have lax data security.read more
Cumbria First Police Force To Utilise NMC Tools
Cumbria Constabulary has become the first police force to use the National Management Centre (NMC) for cybersecurity set up under the National Police Chiefs’ Council (NPCC).read more
Phishing Attacks Bypassing 2-Factor Authentication
Penetration testers and attackers have a new tool in their arsenal that can be used to automate phishing attacks in a way that defeats two-factor authentication (2FA) and is not easy to detect and block, reports CSO Magazine.read more
Third of Breaches Caused By Unpatched Vulnerabilities
IT security professionals have admitted that a third of cybersecurity breaches are the result of vulnerabilities that they should have patched.read more