Cyber Leadership Solution

Cyber Risk Assessment

Our cyber risk assessment provides clients with a cyber risk resiliency rating benchmarked against industry verticals. The cyber risk assessment will highlight key areas of focus and provide recommendations around remediation of these weaknesses.

Upon completion of this assessment, a detailed report will then be produced highlighting key areas of focus and/or key gaps that need to be addressed across the following business areas: People, Process & Technology.

 

Mitigation Services

Address general and specific threats to clients. Cyber security experts will work with leaders to determine the most appropriate material/service areas to cover in training: external penetration testing services; external/internal infrastructure review; wireless connectivity; web application attacks; social engineering; phishing attacks; cyber training review/recommendations and managed security services review.

 

Legal Obligations

Roles, responsibilities and obligations of industry leaders in the context of cyber security. As part of our offering, participants will work with a cyber incident response lawyer. The objective of this session is to understand more about clients and their privacy obligations more generally, including the application of the Notifiable Data Breaches Scheme (NDB Scheme) under the Privacy Act 1988 (Cth) (Privacy Act).

Our framework gives clients a clear vision of whether it is caught by the Privacy Act and what its mandatory investigation and reporting obligations are. As well as guidance on other key commercial and legal considerations that clients should take into account in the wake of a cyber incident.

 

PR / Communications

Prepare clients with the ability to respond to a cyber-attack or data breach. This element of the training is with a top Australian PR guru and focuses on the provision of a PR/Communications Plan. The purpose of this element is to provide clients with a strong platform for being able to deliver bulletproof messaging in the event of a data breach.

Templated statements for clients to use in the event a data breach occurs. Consultation with client executives to define a Core Crisis Team (CCT). A clear processed map and protocols around what to do in the event of a data breach. On-site media training with key executives, including scenario training.