Are you prepared for a cyber crisis? Our eBook offers practical advice and actionable tips for conducting table-top exercises.

Download The Complete Guide Contact Us

Navigating a Third-Party Data Breach: Santander’s Effective Communication Strategy

Last week the Spanish bank, Santander, reported that they had suffered a data breach via a third party….

Read more

DFSA’s Cyber Risk Management Guidelines: A Blueprint for Cyber Resilience?

During 2023 the United Arab Emirates was busy. Very busy in fact. They implemented a significant number of legislative reforms in the areas of cyber […]

Read more

A 7 step crisis communication plan checklist

The purpose of this crisis communication plan checklist is to allow you a quick and easy way to evaluate your existing cyber crisis communication plan […]

Read more

Key risk indicators in cyber security

Understanding key risk indicators (KRIs) in cybersecurity In the constantly evolving landscape of cybersecurity, key risk indicators (KRIs) play a crucial role in measuring and […]

Read more

How to write an effective ransomware playbook

Ransomware playbooks contain detailed instructions on what to do in the event of a ransomware attack. Read our guide to getting started with developing a ransomware playbook for your organisation.

Read more

How to get exec approval for a cyber exercise

Testing your response to a cyber-attack will save you resources in the event of a real incident, but for many organisations taking the first step in exercising can seem like a big commitment in time and energy. Here are some top tips on getting exec approval for a cyber exercise.

Read more

Get started with crisis communication planning

Cyber-attacks are no longer outlier events. In fact, the old saying of “it’s not if – but when” has sadly proven true for many organisations. For this reason many organisations are now heavily focused on planning and preparing for a cyber-attack and increasing their levels of resilience, response and redundancy to enable them to survive.

Read more

7 Examples of Cyber Tabletop Exercises

Would you know how to respond if your organisation was hit by a cyber attack? Running a cyber tabletop exercise allows you to prepare and test responses in a safe environment. But what type of cyber incident should you use in your exercise? Here are seven examples of cyber tabletop exercises that you could consider running for your crisis team.

Read more

A big change for future cyber-attack victims in France?

A big change is coming in France. From April 24th this year cyber attack victims will now have 72 hours…

Read more

Monero and the rise of privacy coins in ransom demands

Bitcoin has been synonymous with ransomware for as long as cybercriminals have been encrypting hard drives. Now ransoms are increasingly being demanded in alternative cryptocurrencies […]

Read more

Preparing for a ransomware attack: Payment

Another year passes and we are still not seeing the significant dip in ransomware and double extortion…

Read more

The Complete Guide to Running a Cybersecurity Tabletop Exercise

What is a cybersecurity tabletop exercise? A tabletop exercise is an engaging and realistic simulation of a cyber crisis situation. It tests human and managerial […]

Read more

Ransomware – not just flying south for the winter.

In 2022 major ransomware groups have been looking for new profitable markets, and their gaze has fallen…

Read more

Can cryptocurrency platforms claim paying attackers is a “White Hat Bounty”?

Today I want to talk about bug bounties. You are probably sitting there thinking you have heard every…

Read more

Lisa Forte – Darknet Diaries

One of our Partners, Lisa Forte, was asked to be a guest on what is perhaps the most popular and influential…

Read more

Lloyd’s of London exclude nation-backed cyber attacks from insurance

Lloyds of London has announced that from 2023 all of its insurer groups will have to exclude “catastrophic”…

Read more

OFAC Sanctions Tornado Cash: what this means for ransomware payments

In early August the U.S Treasury’s Office of Foreign Assets Control (OFAC) sanctioned another popular…

Read more

Lisa Forte talks about table-top exercises on Mimecast’s Phishy Business

Listen to the episode here: Listen on Spotify Episode Description: In this episode of Phishy Business, we take a look at cyber crisis exercises and […]

Read more

Maersk incident response

Updated April 2023 Fire drills are commonplace. We test the alarms, the evacuation procedures and the fire marshals get to practice their roles. In a […]

Read more

3 easy traps your Crisis Management Team could fall into and how to prevent them

Your Crisis Management Team, CMT, helps prepare your organisation for an incident and manages the strategic response to any incidents or crisis that occurs. In […]

Read more

A new ransomware business model?

2020 and 2021 have seen some pretty epic ransoms being paid by companies that at one point in time you would have assumed would never […]

Read more

Rebuilding after a cyber attack

We talk a lot about handling the initial car crash of a breach. What to do first, the comms that need to go out and […]

Read more

The Gold-Silver-Bronze Command Structure

The Gold-Silver-Bronze or ‘GSB’ command structure was rooted in and developed heavily by the UK emergency services. It was designed to establish a clear hierarchical […]

Read more

Wargaming, Cyber Attacks and Astronaut thinking

CEO Digital Show This week Lisa was on the CEO Digital show discussing Wargaming, Cyberattacks, Protecting Against Romance Fraud, & ‘Astronaut Thinking’ in Leadership. Key points […]

Read more

Why Run a Cyber Exercise?

Your company could have the most detailed response plans in the world but if they have not been tested they may well be useless when they are most needed. A cyber security incident is not a good time for seeing if your plans actually work.

Read more
Menu