Designing Cyber Incident Response Plans

Presented by

Amar Singh, CEO, Cyber Management Alliance

About this talk

Designing a response plan to a cyber incident may seem like an easy task. Most people will download a template assuming it’s the best way to create a response plan. What do most templates do? Most templates will tell you to 'chuck it all in the plan', including the 'kitchen sink'. Most templates, when filled in, are as long as 50-100 pages. The reality is that no one ever reads the cyber incident response plan before the actual incident! As in any emergency there is little time to read 100s of pages. The information MUST be at hand and easy to access. There is a better way. Join Cyber Management Alliance’s CEO, Amar Singh, as he shows us how to design and then test your Cyber Incident Response Plans. He will also share 5 key components you should focus when creating your cyber incident response plan. You can also find out where to get your EXCLUSIVE access to our Cyber Incident Response Plan Template that you can use immediately. >> Download the template: << >> Security training discount codes: <<
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (2)
Subscribers (13436)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. This BrightTALK channel is an extension of the group and the ISCN website (, featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more