Leadership through a Cyber Security Incident
What to do before, during and after a security incident? How to deal with a network distributed denial of service (DDoS) incident? What communication process to follow during a security incident? How to ensure the teams can execute the Incident Response Plan?
Our process begins with an evaluation of your existing Information Security Strategy, business objectives, Risks, Threats, Incident Response capability and history. Please contact us for more information.