THE CYBER BREACH COMMUNICATION PLAYBOOK
  • Home
  • The Book
  • The Blog
  • Free Downloads
  • Contact us

Download excepts & diagrams from the Playbook.

The two excepts give you a taste of the approachable style the book is written in. 

The five diagrams are explained in the book. They cover, in order:
  • a guide to the reporting steps in the mandatory data breach reporting scheme
  • our guidance on pre-breach preparation
  • indicative cyber breach communication accountabilities and delegations within a typical large corporate structure
  • a post-breach triage approach for immediate action
  • a slightly tongue-in-cheek, but still pretty useful guide to deciding whether or not to pay a ransomware demand.
In our Workshop we explore these processes in greater depth and help you come up with a workable plan to suit your specific circumstances.
excerpt_1_-_preface_and_intro.pdf
File Size: 90 kb
File Type: pdf
Download File

excerpt_2_-_attack_scenarios.pdf
File Size: 92 kb
File Type: pdf
Download File

data_breach_reporting_flowchart.pdf
File Size: 25 kb
File Type: pdf
Download File

pre_breach_preparation.pdf
File Size: 35 kb
File Type: pdf
Download File

delegation_flow_chart.pdf
File Size: 68 kb
File Type: pdf
Download File

data_breach_response_process.pdf
File Size: 30 kb
File Type: pdf
Download File

ransomware_algorithm.pdf
File Size: 38 kb
File Type: pdf
Download File

© 2018-2020  ALL RIGHTS RESERVED   |   PRIVACY POLICY                       THE BOOK   |  THE BLOG   |   FREE DOWNLOADS  |  CONTACT US
  • Home
  • The Book
  • The Blog
  • Free Downloads
  • Contact us