Live Online Courses

GCHQ Certified Managing & Preparing for Cyber Incidents
Live Online Course

BCM-IT 2 Days £1,050.00 (+ VAT)

Course Overview/Dates

A two day non-technical course, aimed at preparing organisations to manage their cyber response at the strategic/crisis management level. Topics include cyber risk assessments, playbook development, GDPR reporting incidents and reputation management.

This training course is delivered as a two day, live online training course. Scheduled breaks will be provided within each session. During the course, delegates will be able to use their microphones to take part in discussions and ask the tutor any questions, there is also the option to use a webcam too. Interactivity features used during the training may include the use of breakout sessions for group work, polls and quizzes.

Timings are indicative and exact timings may vary due to student experience and their interest in certain topics. The course may finish earlier if all topics have been covered.

Timetable

Day 1 09.30-12.30 BST 13.30-16.30 BST
Day 2 09.30-12.30 BST 13.30-16.30 BST

What's included?

  • Course slides
  • Certificate of attendance

Course Dates

Dates Number of days Location Price
Mon 1 Mar 2021
£1,050.00 Book
Course tutor: Charlie Maclean-Bristol MA (Hons), PgD, FBCI, FEPS
Back to top

Details & Programme

Over the last few years the number of cyber incidents has grown, affecting organisations large and small. High profile incidents such as Sony, TalkTalk, and the Petya and NHS ransomware attacks, have had a major impact on the operations and reputation of the organisations.

"Thankfully, we now live in a world where it is accepted that data breaches happen and organisations are more comfortable disclosing that they have been victim to an attack. However, with this welcome move away from victim blaming, organisations are now being judged more on how well they manage a breach." - Brian Honan, ComputerWeekly

This training course is not a technical response, but looks at the actions organisations can take to prepare themselves, and how they should manage a cyber incident, including very importantly, how to manage communications associated with the incident. It will also look at the types of cyber attacks, the cyber landscape and how to exercise your cyber response plan.

Delegates will learn how to prepare their organisation, how to develop an effective response and how to manage an incident should it occur.

The course is based on good practice from a variety of government and private organisations. This course has been certified by GCHQ and is the only certified course which deals with reputational issues associated with the preparing for and responding to a cyber incident.

Modules

Module 1: Cyber Threats and Landscape

  • Definitions
  • Number of different case studies
  • Different types of cyber threats
  • Who are the different threat actors?
  • What are the threat vectors
  • Cyber incident impacts
  • Cyber threats to your industry
  • Cyber video and discussion

Module 2: Prepare - Understanding your vulnerabilities and risks

  • Understanding your organisation’s vulnerabilities
  • Questions to ask to understand your information security culture, cyber preparation and awareness
  • Incident reporting helpline
  • Measuring cyber preparation and maturity
  • Understanding what you have to lose and conducting a cyber data risk assessment

Module 3: Prepare - Developing a cyber incident response framework

  • Reviewing and developing your cyber policy and guidance
  • Developing a cyber incident response team
  • Developing scenario responses
  • Developing decision and scenario based playbooks
  • Third party support, insurance and cyber intelligence

Module 4: Prepare - Awareness and Cyber Exercises

  • What do senior managers need to know about cyber
  • Cyber exercise scenarios
  • Styles of exercises
  • Exercising at different levels within the organisation
  • Making exercises realistic
  • Hints and tips for successful exercises

Module 5: Respond - Overview of incident management and technical cyber response

  • Incident response overview - what are we trying to achieve
  • Difference between a cyber and a 'normal' incident
  • React, Respond, Resolve framework for managing incidents
  • Identifying the cyber incident
  • Triaging incidents
  • Cyber impact assessment
  • Kill Chains and Diamond Model
  • Forensics, investigations and third-party response

Module 6: Respond - Executive Incident Management

  • Situational awareness and OODA loop
  • Use of situation - direction - action
  • Incident decision making
  • Information management
  • Setting of incident objectives
  • Statutory and regulatory reporting including GDPR requirements

Module 7: Respond - Crisis Communications and Reputation Management

  • Communications case study- Equifax
  • Communications pre-incident preparation
  • Managing your organisation's communications with customers, stakeholders and the media
  • Stakeholder information requirements
  • Developing a communications strategy
  • Cyber attack 'victim or villain'

Module 8: Recovery - Using existing BC plans to recover operations

  • Use of existing business continuity plans, DR and crisis plans to help lessen the impact of the incident

Final response exercise

  • Exercise Athena - opportunity to bring all the knowledge together during an exercise
Back to top

Course Benefits

Completing this course will enable you to:

  • Understand the different types of cyber attack and cyber incident landscape
  • Look at the preparation which can be carried out prior to a cyber incident occurring
  • Create a cyber playbook
  • Identify the responses and issues associated with responding to a cyber attack
  • Plan and run a cyber exercise

What are the benefits of choosing GCHQ Certified Training (GCT)?

  • Individuals and organisations can easily and quickly identify high quality, relevant training
  • The course materials have been rigorously assessed against the exacting standards of GCHQ
  • The quality of the trainers’ delivery and the course administration has been quality checked
  • GCT is based on the industry-respected IISP Skills Framework
  • GCT is invaluable for anyone seeking to acquire or improve their cyber security skills, including those seeking the NCSC's Certified Professional status (CCP)
  • GCT certified courses identify training which delivers what it says it will
Back to top

Who Should Attend?

  • Business continuity and resilience managers
  • IT managers
  • CIOs and CTOs
  • Crisis managers
  • Members of crisis management teams or those responsible for crisis management and crisis communications
Back to top

Tutors

Charlie Maclean-Bristol

Charlie Maclean-Bristol

MA (Hons), PgD, FBCI, FEPS

Back to top

In-house Options

If you would like this training delivered for your organisation only, please contact the BC Training team on 01253 542650 or email info@b-c-training.co.uk.

Back to top

Locations

Cyber Ransoms - Should I Pay?

Cyber Ransoms - Should I Pay?

Catalogue request from Nicholas Deakin

Catalogue request from Nicholas Deakin

AVAILABLE TO PRE-ORDER: Business Continuity Exercises: Quick Exercises to Validate Your Plan

AVAILABLE TO PRE-ORDER: Business Continuity Exercises: Quick Exercises to Validate Your Plan

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Auditor, London, 24th-28th May 2021

quote for PECB Certified ISO 22301 Lead Implementer, London, 10th-14th May 2021

quote for PECB Certified ISO 22301 Lead Implementer, London, 10th-14th May 2021

Avoiding burnout during your COVID-19 response

Avoiding burnout during your COVID-19 response

What is doxing, and should I be worried about it?

What is doxing, and should I be worried about it?

Crisis Communications Support Teams - What are they and do I need one?

Crisis Communications Support Teams - What are they and do I need one?

Marks out of 100 for the NZ Stock Exchange Cyber Incident Response

Marks out of 100 for the NZ Stock Exchange Cyber Incident Response

Was COVID-19 a ‘Black Swan’? And why this is an important question…

Was COVID-19 a ‘Black Swan’? And why this is an important question…

Catalogue request from Grace Parkinson

Catalogue request from Grace Parkinson

My Thoughts On Online Exercises

My Thoughts On Online Exercises

Logging in a Digital Age

Logging in a Digital Age

Catalogue request from robert olobo

Catalogue request from robert olobo

COMING SOON! Business Continuity Exercises: Quick Exercises to Validate Your Plan

COMING SOON! Business Continuity Exercises: Quick Exercises to Validate Your Plan

Dealing with emotion in crisis communications – the UK results fiasco

Dealing with emotion in crisis communications – the UK results fiasco

Catalogue request from Mirofora Geroulis

Catalogue request from Mirofora Geroulis

What type of incident is business continuity meant to deal with?

What type of incident is business continuity meant to deal with?

Catalogue request from Olaf Blaak

Catalogue request from Olaf Blaak

Catalogue request from mrs letitia samuels

Catalogue request from mrs letitia samuels

Catalogue request from Jaime

Catalogue request from Jaime

Achieving situational awareness during an incident

Achieving situational awareness during an incident

A Model for Situational Awareness

A Model for Situational Awareness

The Effects of Stress on the Ability of Teams and Individuals to Manage Incidents

The Effects of Stress on the Ability of Teams and Individuals to Manage Incidents

Building an Incident Team Competency Framework

Building an Incident Team Competency Framework

Catalogue request from keeley robson

Catalogue request from keeley robson

Catalogue request from David Richard Sharnock

Catalogue request from David Richard Sharnock

Catalogue request from David Richard Sharnock

Catalogue request from David Richard Sharnock

Catalogue request from Neil Ackers

Catalogue request from Neil Ackers

Why, for many organisations, we are entering the most dangerous period of coronavirus.

Why, for many organisations, we are entering the most dangerous period of coronavirus.

quote for CBCI Certification Course (GPG), Live Online, 20-24 July 2020

quote for CBCI Certification Course (GPG), Live Online, 20-24 July 2020

Why you shouldn’t develop a new Pandemic Plan

Why you shouldn’t develop a new Pandemic Plan

quote for CBCI Certification Course (GPG), Live Online, 20-24 July 2020

quote for CBCI Certification Course (GPG), Live Online, 20-24 July 2020

Catalogue request from Jon Southgate

Catalogue request from Jon Southgate

The Business Continuity Manager’s role in the recovery phase of coronavirus

The Business Continuity Manager’s role in the recovery phase of coronavirus

Catalogue request from CHARLES NDUNGA

Catalogue request from CHARLES NDUNGA

COVID-19 – A massive failure of risk management?

COVID-19 – A massive failure of risk management?

20/20 Vision: Comments on Exercise Iris (Scotland’s virus exercise in 2018)

20/20 Vision: Comments on Exercise Iris (Scotland’s virus exercise in 2018)

Catalogue request from ee yew chuan

Catalogue request from ee yew chuan

Catalogue request from ee yew chuan

Catalogue request from ee yew chuan

Catalogue request from Ankurkumar Desai

Catalogue request from Ankurkumar Desai

Dominic Cummings – A crisis management case study

Dominic Cummings – A crisis management case study

Marks out of 100 for Easyjet’s Cyber Incident Response

Marks out of 100 for Easyjet’s Cyber Incident Response

Emergency Communications – Awareness Campaigns

Emergency Communications – Awareness Campaigns

Catalogue request from Rachel Simpson

Catalogue request from Rachel Simpson

Why responding to a cyber incident needs an all department response

Why responding to a cyber incident needs an all department response

Catalogue request from Suzanne Renton

Catalogue request from Suzanne Renton

20/20 Vision: Comments on Exercise Cygnus (UK's pandemic exercise in 2016) and what happened

20/20 Vision: Comments on Exercise Cygnus (UK's pandemic exercise in 2016) and what happened

Catalogue request from oba okge

Catalogue request from oba okge

COVID-19 – Why you should be conducting a debrief now!

COVID-19 – Why you should be conducting a debrief now!

Catalogue request from Carole Frost

Catalogue request from Carole Frost

Lockdown Learning Webinar Recording - Decision Making During a Crisis

Lockdown Learning Webinar Recording - Decision Making During a Crisis

Catalogue request from michael bodi

Catalogue request from michael bodi

Catalogue request from Brian Mutale

Catalogue request from Brian Mutale

Crisis Communications - Skype to the rescue

Crisis Communications - Skype to the rescue

quote for The Great Return: How to Restart Businesses from COVID-19 Lockdown Online Session, 30 April, 10am-12:30pm

quote for The Great Return: How to Restart Businesses from COVID-19 Lockdown Online Session, 30 April, 10am-12:30pm

Decision Making During a Crisis

Decision Making During a Crisis

Governed Unit of Crisis Management

Governed Unit of Crisis Management

Organising Your Response Plan

Organising Your Response Plan

Exercising to Failure

Exercising to Failure

Catalogue request from Suresh

Catalogue request from Suresh

Catalogue request from Daniel Villa

Catalogue request from Daniel Villa

Lockdown Learning Webinar Recording - Developing an Exercise Programme

Lockdown Learning Webinar Recording - Developing an Exercise Programme

quote for CBCI Certification Course (GPG), Live Online, 11-15 May 2020

quote for CBCI Certification Course (GPG), Live Online, 11-15 May 2020

Developing an Exercise Programme

Developing an Exercise Programme

Coronavirus Response: The Peak-End Rule

Coronavirus Response: The Peak-End Rule

IT Disaster Recovery vs. Business Continuity

IT Disaster Recovery vs. Business Continuity

quote for CBCI Certification Course (GPG), Live Online, 11-15 May 2020

quote for CBCI Certification Course (GPG), Live Online, 11-15 May 2020

Catalogue request from Ian Carbin

Catalogue request from Ian Carbin

Lockdown Learning Webinar - Avoiding Groupthink: Observations on Decision Making During a Crisis

Lockdown Learning Webinar - Avoiding Groupthink: Observations on Decision Making During a Crisis

Battling the COVID-19 Infodemic

Battling the COVID-19 Infodemic

Catalogue request from Ann Marie

Catalogue request from Ann Marie

Avoiding Groupthink: Observations on Decision Making...

Avoiding Groupthink: Observations on Decision Making...

Catalogue request from Ahmad Alsharif

Catalogue request from Ahmad Alsharif

Catalogue request from DAVID HARRIS

Catalogue request from DAVID HARRIS

Overview / Webinars

Overview / Webinars

Panic buying toilet roll – lesson identified or learned?

Panic buying toilet roll – lesson identified or learned?

Catalogue request from Asad Sabbah

Catalogue request from Asad Sabbah

An in-depth look at RTOs: Everything you ever wanted to know!

An in-depth look at RTOs: Everything you ever wanted to know!

Business Continuity and Coronavirus - Marks out of 10

Business Continuity and Coronavirus - Marks out of 10

Overview / Live Online Courses

Overview / Live Online Courses

Catalogue request from Gavin Blanchfield

Catalogue request from Gavin Blanchfield

Catalogue request from Claire Thomas

Catalogue request from Claire Thomas

After coronavirus, what next?

After coronavirus, what next?

Coronavirus Public Reaction – ‘Keep calm and carry on’ or bystander effect?

Coronavirus Public Reaction – ‘Keep calm and carry on’ or bystander effect?

Catalogue request from oba okge

Catalogue request from oba okge

Coronavirus (COVID-19) Planning - 7 Steps You Should Take Now

Coronavirus (COVID-19) Planning - 7 Steps You Should Take Now

Catalogue request from Clare Tate

Catalogue request from Clare Tate

Catalogue request from Elsa Antonia Biyang Obiang

Catalogue request from Elsa Antonia Biyang Obiang

Catalogue request from lisa allcorn

Catalogue request from lisa allcorn

Decision Making During a Crisis  - Decision Making Models

Decision Making During a Crisis - Decision Making Models

quote for BCI Business Impact Analysis, London, 30 - 31 March 2020

quote for BCI Business Impact Analysis, London, 30 - 31 March 2020

Catalogue request from Pallavi

Catalogue request from Pallavi

At last, a good example of how to respond to the reputational aspects of a cyber incident

At last, a good example of how to respond to the reputational aspects of a cyber incident

Key Learning Points from the Scottish Continuity Groups Seminar on the 4th February 2020

Key Learning Points from the Scottish Continuity Groups Seminar on the 4th February 2020

Pandemic Planning - What is a Pandemic Operating Regime, and do I need one?

Pandemic Planning - What is a Pandemic Operating Regime, and do I need one?

Back to top

Sign-up to our weekly bulletin

Twitter feed

Bulletin
Cyber Ransoms - Should I Pay?

Charlie discusses the possible benefits of paying a cyber ransom and whether this is illegal.

30 October 2020

“Ewan [Donald] was very good at delivering the course, his additional knowledge and expertise were of benefit throughout.”

Catherine Whitelaw
ACCA Global
View further testimonials