This module contains realistic, interactive scenarios which should be used to develop the best response to a real life data breach situation.
Business ValueUsing these scenario practice sessions can literally save your company from the catastrophic results of a data breach incident. The majority of companies both large and small are now getting their networks breached resulting in data leaks, lost production time and a huge waste of management resource time.
Not all breaches can be prevented, and, the manner in which a company responds can be either efficient, professional and positive for the company or unprepared, haphazard and extremely damaging for the company.
Completing the exercises gives the Board insight and allows the participants to gain some real-life experience of making difficult decisions.
Ask questions, Explore answersIt is important for all participants to view these exercises provide a safe environment for participants to freely ask questions, explore answers and to broaden knowledge.
The intention is to spark discussion, there are trick questions or no hidden agendas, these are realistic scenarios that actually happen to businesses. Participants should validate assumptions and ask additional questions. There are no "wrong" answers because it is a discovery of your own organisation operating is challenging situations.
There will be five scenarios and we recommend that boards plan to complete one exercise every two months, thereby covering the entire course within the year.
The FacilitatorThis module is structured into sections, and each section contains the scenario material and directions to the facilitator. The company can appoint a manager as it's facilitator or may hire an independent third party to assist them.
You can get help in delivering this Incident Response Training module direct from the developer David R.Bird who specialises in this work and is available to provide the Facilitator Service or to train your in house facilitator.
Incident Response Scenario 1Launching Your New Mobile App. You are at a very positive Board meeting: your IT chief has demonstrated your new mobile app and the marketing director has gone over his campaign, everything is ready. Your cyber security guy gives the thumbs up, no problems. You are ready for launch.
Incident Response Scenario 2Great Customer Service. One of your customers contacts you by email because he is having difficult making payment and thinks there may be some incorrect details on the invoice. The customer needs some help from your finance department.
Your company prides itself on great customer service.