Cyber Attack Simulation for 450 Executives at the Finance Malta conference, in May 2018. Will your Board Directors also disagree on how to respond to a Breach?
Cyber Resilience: managing 3rd Party Risks in Financial ServicesKevin Duffey
Presentation given to Chief Risk Officers, Heads of Operational Resilience and CISOs at the annual Marcus Evans conference on Operational Resilience and Business Continuity in Financial Services.
Includes how to measure, mitigate and manage cyber vulnerabilities at outsourcing firms and other suppliers of critical ("material") services, as expected by regulators like the Bank of England / Prudential Regulatory Authority, European Banking Authority, and Financial Stability Board.
ALLPORT CARGO SERVICES seek to establish itself by providing the most possible flexibility
and reliability in customer service. Our network enable clients to benefit from a package
tailored to their individual needs and time requirements. We keep the promise you give to
your customers:- JUST - IN- TIME.
ALLPORT CARGO SERVICES PAKISTAN confirms its dedication to the business and shows its
commitment to customers and suppliers.
• Freight Forwarding Import, End to End services (LCL & FCL Ocean & Air Cargo)
• Freight Forwarding Export, End to End services (LCL & FCL Ocean & Air Cargo)
• Warehousing / Inventory management in Lahore and Karachi
• Inland Transportation Services
Contact: Nadeem Yasin (+923158483623)
AW203: Lift And Shift - Migrating Workloads To NutanixNEXTtour
Provisioning Nutanix-based infrastructure is easy, but what about moving applications to Nutanix? In this session, an experienced Nutanix consultant and a datacenter director for a global company will share real-world best practices for efficiently and easily migrating all types of server workloads to a Nutanix Enterprise Cloud Platform. You will hear in-depth and practical information on migration assessments, platform sizing, performance analysis and more. In addition, you will learn how to choose the right tools for your migration project, and when to enlist expert third-party services and facilities to mitigate risk.
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
Presentation delivered by Mitch Tanenbaum, Principal, INFORMATION RISK STRATEGY CONSULTING at the IFG Wealth Management Forum Spring 2016 held in Scottsdale AZ.
In this presentation, we walk through the WHAT - what are the FTC's Red Flag Rules; the HOW - how to become compliant using the idBUSINESS Red Flag Compliance Module; and most importantly, the WHY - why is this a good idea for my business?
Addressing cyber risk managment from SME perspectiveCyber Watching
Miguel Manteca's (Technical Sales Manager at HISPASEC) presentation will focus on making visible the most frequent cyber risks to which SMEs are exposed. Emphasis will be placed on the loss of data and its possible consequences for the business. The talk will try to give the guidelines to prevent them and make your company digitally safer. Brief introduction to the "Seriot" European project, which addresses the issue of internet security of things.
Cyber Resilience: managing 3rd Party Risks in Financial ServicesKevin Duffey
Presentation given to Chief Risk Officers, Heads of Operational Resilience and CISOs at the annual Marcus Evans conference on Operational Resilience and Business Continuity in Financial Services.
Includes how to measure, mitigate and manage cyber vulnerabilities at outsourcing firms and other suppliers of critical ("material") services, as expected by regulators like the Bank of England / Prudential Regulatory Authority, European Banking Authority, and Financial Stability Board.
ALLPORT CARGO SERVICES seek to establish itself by providing the most possible flexibility
and reliability in customer service. Our network enable clients to benefit from a package
tailored to their individual needs and time requirements. We keep the promise you give to
your customers:- JUST - IN- TIME.
ALLPORT CARGO SERVICES PAKISTAN confirms its dedication to the business and shows its
commitment to customers and suppliers.
• Freight Forwarding Import, End to End services (LCL & FCL Ocean & Air Cargo)
• Freight Forwarding Export, End to End services (LCL & FCL Ocean & Air Cargo)
• Warehousing / Inventory management in Lahore and Karachi
• Inland Transportation Services
Contact: Nadeem Yasin (+923158483623)
AW203: Lift And Shift - Migrating Workloads To NutanixNEXTtour
Provisioning Nutanix-based infrastructure is easy, but what about moving applications to Nutanix? In this session, an experienced Nutanix consultant and a datacenter director for a global company will share real-world best practices for efficiently and easily migrating all types of server workloads to a Nutanix Enterprise Cloud Platform. You will hear in-depth and practical information on migration assessments, platform sizing, performance analysis and more. In addition, you will learn how to choose the right tools for your migration project, and when to enlist expert third-party services and facilities to mitigate risk.
PROTECTING YOUR BUSINESS AND CLIENT INFORMATION IN A DIGITAL WORLD - Mitch Ta...IFG Network marcus evans
Presentation delivered by Mitch Tanenbaum, Principal, INFORMATION RISK STRATEGY CONSULTING at the IFG Wealth Management Forum Spring 2016 held in Scottsdale AZ.
In this presentation, we walk through the WHAT - what are the FTC's Red Flag Rules; the HOW - how to become compliant using the idBUSINESS Red Flag Compliance Module; and most importantly, the WHY - why is this a good idea for my business?
Addressing cyber risk managment from SME perspectiveCyber Watching
Miguel Manteca's (Technical Sales Manager at HISPASEC) presentation will focus on making visible the most frequent cyber risks to which SMEs are exposed. Emphasis will be placed on the loss of data and its possible consequences for the business. The talk will try to give the guidelines to prevent them and make your company digitally safer. Brief introduction to the "Seriot" European project, which addresses the issue of internet security of things.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Over 40% of UK businesses experienced a cyber security breach or attack in the last 12 months, according to a new report from the Department for Digital, Culture, Media and Sport. The Cyber Security Breaches Survey 2018’s finding was that three quarters of businesses have now made cyber security a high priority for their senior management.
However, only 27% actually have formal cyber security policies in place and just 30% have board members or trustees with responsibility for cyber security. Breaches were more often identified among the organisations that hold personal data, where staff use personal devices for work or that use cloud computing. More worryingly, one in five businesses admitted to never updating their senior managers on cyber security issues.
All businesses are targets for hackers, no matter what their size or sector. Attacks are becoming more sophisticated and don’t even always come from humans but instead from hacker-created bots which are programmed to continually evolve new algorithms in order to identify potential areas of attack.
Technology and the ways in which businesses communicate and transact will continue to expand in 2019. Predicated trends are extensive though worth mentioning include the increased take up of single password log-ins, allowing employees to access all their authorised systems, increased reliance on cloud storage especially for customer data, the arrival of 5G supporting new technology and flexible working, ever more sophisticated AI including chat bots and workflow applications, 24/7 customer multi-platform expectations and many more.
WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW
BEFORE, DURING AND AFTER AN ATTACK
View the webinar:
https://www2.fireeye.com/The_Board_and_CyberSecurity_webinar_EMEA.html?utm_source=SS
Download the full report:
https://www2.fireeye.com/WEB-2015-The-Cyber-Security-Playbook.html?utm_source=SS
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
PART II – Cyber Security: the mitigation strategies – how to identify, assess and mitigate cyber risks
The Risk Manager must be responsible, as for others risks, for the quantification aspect of cyber security. It is a necessary step towards understanding and managing the exposure of the company. He/she should act as a facilitator between the Board and the operational department (IT, Finance, Legal and other functions).
A key subject to unlock the cyber insurance development and to support the economic growth the Digital world is bringing to Europe.
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
According to the latest research from cyber security firm, Kamino, 45% of financial advisers had experienced a cyber incident last year.
Julian Plummer, founder of Kamino, delves into why cyber security is a very real issue for financial advisers and their clients, and the types of cyber incidents that are impacting the financial planning industry. He also provides easy to implement measures to help you improve the cyber security of your practice.
In this report we use survey findings and outcomes from our conversations with small and medium-sized businesses to debunk common SMB cybersecurity myths. Our data specifically covers SMBs with 250 to 499 employees.
Most companies have ethics and compliance policies in place and those policies usually include training for employees. That training typically includes material about policies prohibiting discrimination and harassment, bribery and excessive gift-giving. But it usually does not teach employees how to recognize signs of fraud and how to report them.
Employee fraud awareness training is one of the most important ways your company can protect itself from fraud which, according to the Association of Certified Fraud Examiners, costs the average company five per cent of its revenues every year.
Webinar Agenda:
1. What does fraud look like during the COVID-19 crisis.
2. Emerging threats in payments fraud.
3. Best practices to combat payment fraud.
Webinar Agenda:
1. What does fraud look like during the COVID-19 crisis.
2. Emerging threats in payments fraud.
3. Best practices to combat payment fraud.
We've summarised the key findings from 100 cyber security surveys. We choose the best of these each month to discus with our customers, to guide & accelerate their cyber resilience journey.
Slides used in VIP Customer Forums hosted by Cyber Rescue Alliance, for individual thought leaders.
These slides supported discussion about where Third Party Risk Management needs to go in the months and years ahead, in the face of dynamic cyber threats.
More Related Content
Similar to Cyber Attack Simulation for 450 Executives
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Over 40% of UK businesses experienced a cyber security breach or attack in the last 12 months, according to a new report from the Department for Digital, Culture, Media and Sport. The Cyber Security Breaches Survey 2018’s finding was that three quarters of businesses have now made cyber security a high priority for their senior management.
However, only 27% actually have formal cyber security policies in place and just 30% have board members or trustees with responsibility for cyber security. Breaches were more often identified among the organisations that hold personal data, where staff use personal devices for work or that use cloud computing. More worryingly, one in five businesses admitted to never updating their senior managers on cyber security issues.
All businesses are targets for hackers, no matter what their size or sector. Attacks are becoming more sophisticated and don’t even always come from humans but instead from hacker-created bots which are programmed to continually evolve new algorithms in order to identify potential areas of attack.
Technology and the ways in which businesses communicate and transact will continue to expand in 2019. Predicated trends are extensive though worth mentioning include the increased take up of single password log-ins, allowing employees to access all their authorised systems, increased reliance on cloud storage especially for customer data, the arrival of 5G supporting new technology and flexible working, ever more sophisticated AI including chat bots and workflow applications, 24/7 customer multi-platform expectations and many more.
WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW
BEFORE, DURING AND AFTER AN ATTACK
View the webinar:
https://www2.fireeye.com/The_Board_and_CyberSecurity_webinar_EMEA.html?utm_source=SS
Download the full report:
https://www2.fireeye.com/WEB-2015-The-Cyber-Security-Playbook.html?utm_source=SS
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016FERMA
PART II – Cyber Security: the mitigation strategies – how to identify, assess and mitigate cyber risks
The Risk Manager must be responsible, as for others risks, for the quantification aspect of cyber security. It is a necessary step towards understanding and managing the exposure of the company. He/she should act as a facilitator between the Board and the operational department (IT, Finance, Legal and other functions).
A key subject to unlock the cyber insurance development and to support the economic growth the Digital world is bringing to Europe.
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
According to the latest research from cyber security firm, Kamino, 45% of financial advisers had experienced a cyber incident last year.
Julian Plummer, founder of Kamino, delves into why cyber security is a very real issue for financial advisers and their clients, and the types of cyber incidents that are impacting the financial planning industry. He also provides easy to implement measures to help you improve the cyber security of your practice.
In this report we use survey findings and outcomes from our conversations with small and medium-sized businesses to debunk common SMB cybersecurity myths. Our data specifically covers SMBs with 250 to 499 employees.
Most companies have ethics and compliance policies in place and those policies usually include training for employees. That training typically includes material about policies prohibiting discrimination and harassment, bribery and excessive gift-giving. But it usually does not teach employees how to recognize signs of fraud and how to report them.
Employee fraud awareness training is one of the most important ways your company can protect itself from fraud which, according to the Association of Certified Fraud Examiners, costs the average company five per cent of its revenues every year.
Webinar Agenda:
1. What does fraud look like during the COVID-19 crisis.
2. Emerging threats in payments fraud.
3. Best practices to combat payment fraud.
Webinar Agenda:
1. What does fraud look like during the COVID-19 crisis.
2. Emerging threats in payments fraud.
3. Best practices to combat payment fraud.
Similar to Cyber Attack Simulation for 450 Executives (20)
We've summarised the key findings from 100 cyber security surveys. We choose the best of these each month to discus with our customers, to guide & accelerate their cyber resilience journey.
Slides used in VIP Customer Forums hosted by Cyber Rescue Alliance, for individual thought leaders.
These slides supported discussion about where Third Party Risk Management needs to go in the months and years ahead, in the face of dynamic cyber threats.
Ensuring Cyber Resilience in the Finance SectorKevin Duffey
Presented at the prestigious Operational Resilience, Outsourcing & Third Party Risk conference in London on 22-23 Nov 2022.
Provides data on Ransomware, Cyber Insurance, DDoS and other fast developing aspects of cyber resilience. Focusses on 3rd Party and 4th Party challenges & opportunities to measure & mitigate risks.
Breaches Anticipated in 2022 as Cyber Security Posture so LowKevin Duffey
Sample of over 500 breaches anticipated by SecurityScorecard, as cyber security posture was so low before the ransomware gang or other cyber attack succeeded.
For daily insights follow Cyber Rescue at https://www.linkedin.com/company/cyber-rescue-alliance/posts/
Cyber Insurance - Best Insights of June 2022.pptxKevin Duffey
Cyber Insurance: best insights of June 2022 to help firms improve their cyber resilience against ransomware and other cyber attacks for operational resilience and business continuity.
Best Cyber Risk Insights from 100 reports published in year to March 2022Kevin Duffey
March 2022: includes Budgets, Salaries, Certifications, Ransoms Paid, Business Losses, emerging Threats and how to Respond to cyber attack. Download and share, because every graph in the the pdf is hyperlinked to a detailed report.
Breaches Anticipated - because firms have weak cyber security visible to hac...Kevin Duffey
March 2022: This document lists hundreds of firms that had a low cyber risk score on SecurityScorecard, for months before they were breached, often by ransomware gangs. If you're responsible for your firm's security, operational resilience or cyber insurance, it's well worth five minutes.
Breaches anticipated in 2021 - Published 14th Jjune 2021Kevin Duffey
New report shows 92 breaches anticipated at firms with weaker cyber security posture than their peers.
So forward this report to your colleagues now, and ask: "which of our Suppliers is most likely to be breached today?"
If your colleagues can't give you graphs like these, just send an email to Assistance@CyberRescue.co.uk and we'll give you a complementary report, to help you measure and manage cyber risk across your supply chain.
Privacy & Security in Feb 2020: new Fintech regulations on Cyber Security at ...Kevin Duffey
Presented to an expert audience at the PrivSec Congress in London on 4th Feb 2020, this presentation uses PayPal & Travelex as topical examples, showing why cyber security of private data processed by suppliers is an increasing concern of Financial Regulators.
And then it demonstrates what your peers are doing to comply with those new regulations.
Let’s work together to mitigate risks.
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Kevin Duffey
Chief Risk Officers and CISOs from 25 of our customers & friends debated their SMART objectives for 2020. Here's the results, showing who to involve and how to report progress on cyber risk across 3rd parties during 2020.
Keynote at Operational Resilience summit - Financial Services - 18th Nov 2019Kevin Duffey
Opening keynote presentation at Operational Resilience in Financial Services summit, with Freshfields, UK Finance and City & Financial Global. Focus on measuring cyber risk at suppliers to mitigate harm.
London First - cyber attack simulation - 22nd May 2018Kevin Duffey
London First is an association of prestigious companies, working together to make London the best place in the world for business. Cyber Resilience is part of that work, so senior executives were taken through this interactive simulation.
Cyber attack response from the CEO perspective - Tallinn Estonia - Short Simu...Kevin Duffey
Estonia is famously a leader in digital and cyber technology. This short simulation was presented to Estonian executives, experts and government representatives. It is a very short version of the sort of executive simulation we run for large enterprises across Europe. Follow us at - https://www.linkedin.com/company/cyber-rescue-alliance/
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
Presented at the annual UK Security Expo in London, to help traditional Security Directors understand and feel confident about the practical ways in which their role should extend to cyber security issues. This presentation was followed by a simple cyber attack simulation (not shown here).
Presented by Barrie Millett and Kevin Duffey of Cyber Rescue.
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfthesiliconleaders
In the recent edition, The 10 Most Influential Leaders Guiding Corporate Evolution, 2024, The Silicon Leaders magazine gladly features Dejan Štancer, President of the Global Chamber of Business Leaders (GCBL), along with other leaders.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Company Valuation webinar series - Tuesday, 4 June 2024FelixPerez547899
This session provided an update as to the latest valuation data in the UK and then delved into a discussion on the upcoming election and the impacts on valuation. We finished, as always with a Q&A
Top mailing list providers in the USA.pptxJeremyPeirce1
Discover the top mailing list providers in the USA, offering targeted lists, segmentation, and analytics to optimize your marketing campaigns and drive engagement.
An introduction to the cryptocurrency investment platform Binance Savings.Any kyc Account
Learn how to use Binance Savings to expand your bitcoin holdings. Discover how to maximize your earnings on one of the most reliable cryptocurrency exchange platforms, as well as how to earn interest on your cryptocurrency holdings and the various savings choices available.
3.0 Project 2_ Developing My Brand Identity Kit.pptxtanyjahb
A personal brand exploration presentation summarizes an individual's unique qualities and goals, covering strengths, values, passions, and target audience. It helps individuals understand what makes them stand out, their desired image, and how they aim to achieve it.
Understanding User Needs and Satisfying ThemAggregage
https://www.productmanagementtoday.com/frs/26903918/understanding-user-needs-and-satisfying-them
We know we want to create products which our customers find to be valuable. Whether we label it as customer-centric or product-led depends on how long we've been doing product management. There are three challenges we face when doing this. The obvious challenge is figuring out what our users need; the non-obvious challenges are in creating a shared understanding of those needs and in sensing if what we're doing is meeting those needs.
In this webinar, we won't focus on the research methods for discovering user-needs. We will focus on synthesis of the needs we discover, communication and alignment tools, and how we operationalize addressing those needs.
Industry expert Scott Sehlhorst will:
• Introduce a taxonomy for user goals with real world examples
• Present the Onion Diagram, a tool for contextualizing task-level goals
• Illustrate how customer journey maps capture activity-level and task-level goals
• Demonstrate the best approach to selection and prioritization of user-goals to address
• Highlight the crucial benchmarks, observable changes, in ensuring fulfillment of customer needs
Building Your Employer Brand with Social MediaLuanWise
Presented at The Global HR Summit, 6th June 2024
In this keynote, Luan Wise will provide invaluable insights to elevate your employer brand on social media platforms including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok. You'll learn how compelling content can authentically showcase your company culture, values, and employee experiences to support your talent acquisition and retention objectives. Additionally, you'll understand the power of employee advocacy to amplify reach and engagement – helping to position your organization as an employer of choice in today's competitive talent landscape.
Tata Group Dials Taiwan for Its Chipmaking Ambition in Gujarat’s DholeraAvirahi City Dholera
The Tata Group, a titan of Indian industry, is making waves with its advanced talks with Taiwanese chipmakers Powerchip Semiconductor Manufacturing Corporation (PSMC) and UMC Group. The goal? Establishing a cutting-edge semiconductor fabrication unit (fab) in Dholera, Gujarat. This isn’t just any project; it’s a potential game changer for India’s chipmaking aspirations and a boon for investors seeking promising residential projects in dholera sir.
Visit : https://www.avirahi.com/blog/tata-group-dials-taiwan-for-its-chipmaking-ambition-in-gujarats-dholera/
Structural Design Process: Step-by-Step Guide for BuildingsChandresh Chudasama
The structural design process is explained: Follow our step-by-step guide to understand building design intricacies and ensure structural integrity. Learn how to build wonderful buildings with the help of our detailed information. Learn how to create structures with durability and reliability and also gain insights on ways of managing structures.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
The Influence of Marketing Strategy and Market Competition on Business Perfor...
Cyber Attack Simulation for 450 Executives
1. Cyber Attack
Executive Simulation
450 Delegates to the annual
Finance Malta conference
joined this simulation
on 17th May 2018
Kevin.Duffey@CyberRescue.co.uk
2. This version of the slides
shows delegate’s answers.
Notice that –like untrained
executives in a real crisis –
people disagreed on what to
do… .
To follow Cyber Rescue: www.tinyurl.com/cyber999
3. Cyber Rescue helps CEOs reduce
harm from cyber attacks
To follow Cyber Rescue: www.tinyurl.com/cyber999
4. You’re now on the Board of Acme
To follow Cyber Rescue: www.tinyurl.com/cyber999
5.
6. Who do you inform?
1. Nobody – this doesn’t look real
2. Police – perhaps they can help
3. CEO – the boss needs to know
4. DPO – tell Data Privacy Officer
5. IT Team – were we breached?
6. Procurement – 3rd party breach
7. Other – eg Security, Insurance…
To follow Cyber Rescue: www.tinyurl.com/cyber999
7. Who do you inform?
Note: 30% of 450
untrained delegates
would not tell their
IT colleagues.
Over 50% wouldn’t
tell their DPO or
CEO, & over 90%
wouldn’t tell the
police of blackmail.
To follow Cyber Rescue: www.tinyurl.com/cyber999
8. A 2nd message “from Korea”
Proof
you don’t care
Info on
187 Customers
To follow Cyber Rescue: www.tinyurl.com/cyber999
9. When to tell affected customers?
1. Immediately
2. In 24 hours
3. In 48 hours
4. In 72 hours
5. In 7 days
6. In 28 days
7. Don’t inform
To follow Cyber Rescue: www.tinyurl.com/cyber999
10. Note: 65% of 450
untrained delegates
say they would
inform customers
within 24 hours.
Rushed notifications
often contain errors,
that increase risk of
harm by fraudsters.
To follow Cyber Rescue: www.tinyurl.com/cyber999
When to tell affected customers?
11. Update from IT Department
The Koreans are probably
still in our systems.
One of our staff may have
helped them.
We can stop them if we
disconnect for 3 days.
To follow Cyber Rescue: www.tinyurl.com/cyber999
12. What executive action to take?
1. Disconnect systems from internet
2. Forensics – what has happened?
3. Remediation – close the breach
4. Ask Insurer to confirm covered
5. Brief the Board and set Budget
6. Submit report to Regulators
7. Implement Cyber Crisis Plan
To follow Cyber Rescue: www.tinyurl.com/cyber999
13. Note: 69% of 450
untrained delegates
say they would
implement their
Cyber Crisis Plan.
When did you last
look at your Cyber
Crisis Plan? Do you
want one?
To follow Cyber Rescue: www.tinyurl.com/cyber999
What executive action to take?
14. Where is your Cyber Crisis Plan?
To follow Cyber Rescue: www.tinyurl.com/cyber999
(Cyber Rescue specializes in helping businesses to write & test their executive response plan)
15. But rumours are circulating…
Acme don’t care about my safety!
Now Russians will steal my money
Because we care
On Friday, Acme launch a great
new service to show customers
how we care
To follow Cyber Rescue: www.tinyurl.com/cyber999
16. What communications needed?
1. Stop other comms, such as ad campaign
2. Create web site with Q&A about breach
3. Customer advice, eg how to prevent fraud
4. Provide script (eg for Twitter & Call Centre)
5. Pre-brief employees about situation
6. Identify advocates to speak for company
7. Customer Compensation to go with apology
To follow Cyber Rescue: www.tinyurl.com/cyber999
17. Note: 81% of 450
untrained delegates
would not prepare
advice to customers
on how to avoid
fraud, and 87%
would not consider
compensation.
Customer loyalty???
To follow Cyber Rescue: www.tinyurl.com/cyber999
What communications needed?
18. Finally, some good(ish) news
“The Breach
was at our
marketing
partner in
France.
Fortunately,
our contract
forces them
to pay costs.”
To follow Cyber Rescue: www.tinyurl.com/cyber999
19. Cyber Attack
Executive Simulation
The End… . This simulation “sample” lasted just 19 minutes.
Take Action Now: We recommend every Executive Teams should invest
at least 55 minutes each year, to rehearse their response to the cascade
of commercial consequences that follow a catastrophic breach.
Cyber Rescue are European leaders in providing these to Boards.
To follow Cyber Rescue: www.tinyurl.com/cyber999
20. Cyber Attack
Executive Simulation
Contact us for:
• An executive simulation for your senior team
• A bespoke response plan to help you lead through a breach
• A fully-automated score of your cyber security, Vs your peers
Kevin.Duffey@CyberRescue.co.uk
To follow Cyber Rescue: www.tinyurl.com/cyber999