Bulletin / Cyber
CYBERUK 2022 – What Did We Learn?
Looking After Your People During a Cyber Incident
Amedia AS Cyber Hack Case Study: A review of their crisis communications from 28th December 2021 - 7th January 2022
Closing the Gap Between Cyber Security and Business Continuity Management
Low-Level Cyber Attacks
‘Countdown to Zero Day’ By Kim Zetter - Book Review
Cyber Podcasts You Need To Listen To!
Kaseya Attack: What is a Supply Chain Cyber Attack?
Process Controls, SCADA and Cyber Security
The Differences Between a Cyber and a 'Normal' Incident
Communications with Stakeholders after a Ransomware Attack
The Hidden Costs of Ransomware
Credential Stuffing - A different type of cyber attack
Beware of the self-wiggling mouse – Cyber vulnerabilities in the water industry
The Yin and Yang of a Cyber Incident Response - The SEPA Cyber Incident: A Case Study
Ransomware attack: Who are you going to call, Mike?
Hackney Council's Cyber Incident: A communications playbook of good practice?
What is doxing, and should I be worried about it?
Marks out of 100 for the NZ Stock Exchange Cyber Incident Response
Marks out of 100 for Easyjet’s Cyber Incident Response
At last, a good example of how to respond to the reputational aspects of a cyber incident
Cyber Data Risk Assessment
An approach to cyber resiliency: unifying cyber security, incident response and business continuity
Cyber Playbooks - revisited and updated
Cyber Incident Management - Looking through the wrong end of the telescope
What lessons can we learn from Marriott’s response to their Cyber Breach?
Crisis Communications During Cyber Incidents – What you need to do now!
Cyber Playbooks Revisited - An Example
Ask The Expert Webinar: Cyber Risk Assessment
What is the difference between a cyber and a “normal” incident?
10 lessons from the report on the NHS WannaCry cyber attack
'A Beginner's Guide to Cyber Security' Webinar
Equifax UK - How not to manage the communications of a cyber breach
Cyber Incident Management Training - 10 Lessons Learned
Some thoughts on the WannaCry Ransomware Attack
Yahoo hack: questions for Business Continuity managers!
Cyber Incident Management and how it is different…
Cyber Security – is Business Continuity missing a trick?
“This was one of the best courses I have taken in some time. It was an excellent class that was most ably facilitated by Gillian [Logie]. She was patient, helpful and explained concepts clearly.”