CYBER WARFARE AND LEADERSHIP


CYBER WARFARE

How to align your organisational security posture to thrive in the face of rogue and nation-state cyber attacks.

CISO BLUEPRINT

Discover a standard-based, battle-tested framework to build a resilient CISO function for your organisation.

SECURITY
OPERATIONS

How can a Service-Driven SOC model help you to deliver the best of breed detection and response capability.

CYBER LEADERSHIP

Learn the art and the science of training and rallying the troops to safeguard your business and thrive during a crisis.

RECENT ARTICLES


    BEST SELLERS


    Leading under Crisis

    How to be proactive and take initiative when leading through a crisis? How to do something even if it might be wrong and realign your aim on the go? What mental models are at your disposal that can help manage a crisis and control its outcome? Which techniques you can use to avoid decision-paralysis or over-analysing? how best to communicate those actions truthfully and honestly as you make decisions and take action ?

    Negotiating Ransom

    How can you control the clock before it starts ticking? What best and worst case scenarios to consider and how to prepare for both? How to establish internal and external communication lines with senior management, legal counsel, the communications department and the government bodies? What can you research about your attacker to understand how the group has handled ransoms in the past? When to decide to pay ransom and how best to treat it as a business transaction without letting emotions get in your way? What tactics can you use to buy time and reduce ransom amount?

    Cyber War Games and Combat Modelling

    Why cyber war games are becoming equally important as other mediums of war and deterrence? How can your cyber leadership can critically appraise the full range of war games and combat simulations and apply them to real problem facing your organisational security? What are the implication of applying the deterministic and stochastic equations to represent cyber capabilities between both homogeneous and heterogeneous forces? How the different methods of representing offensive cyber actors operations and capabilities are used in the training, testing and assessment?

    Maintaining Resilience under Active Aggression

    What world-class processes of creating preventive and recovery systems to deal with potential cyber threats to an organization are available? How can you ensure business process continuity in the wake of a cyberattack? What measures are in place to ensure operational continuity before and during acts of active aggression against the organisation? Which factors classify a resilient business that not only survives but thrive in the face of attacks? How to establish resilient protocols to ensure the business always come out stronger?  Are you including the right mix of black swan events, such as cyber attacks, natural disasters, fires, pandemics, and other internal and external threats?