• Online, Instructor-Led
Course Description

Quarterly breach response drills coaches senior managers and business owners by simulating cyber attacks that are relevant to them. Each session lasts approximately 4 hours depending on need and sessions can be tailored to fit the exact departmental needs. Sessions will provide the tools to: simulate effective breach notifications, assess business impact, make business decisions regarding services shutdown/runtime in crisis time and making sure the business is affected as little as possible. Possible scenarios can cover ransomware, to major data leaks, to DDoS attacks, to phishing and spam attacks. All aspects are targeted in a participatory way to give this group the tools they need to successfully lead their departments during a cybersecurity breach.

Learning Objectives

Quarterly breach response drills coaches senior managers and business owners by simulating cyber attacks that are relevant to them. Each session lasts approximately 4 hours depending on need and sessions can be tailored to fit the exact departmental needs. Sessions will provide the tools to: simulate effective breach notifications, assess business impact, make business decisions regarding services shutdown/runtime in crisis time and making sure the business is affected as little as possible. Possible scenarios can cover ransomware, to major data leaks, to DDoS attacks, to phishing and spam attacks. All aspects are targeted in a participatory way to give this group the tools they need to successfully lead their departments during a cybersecurity breach.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cybersecurity Management
  • Executive Cyber Leadership
  • Program/Project Management and Acquisition
  • Strategic Planning and Policy

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.