When crisis strikes, does your team know exactly what to do?

#expensiveproblem

Our Mission

is for every small to medium-sized business in the world to have a robust Cyber Incident Response Program. Without breaking the bank.

 
Does my company need a Cyber Incident Response Program?

Yes.

Many regulatory and compliance frameworks such as FFIEC, Gramm-Leach-Bliley, PCI DSS, SOX and even HIPAA require you to have an actionable Cyber Incident Response (IR) Plan at a minimum and have specific breach notification requirements. Proper IR planning will make a critical difference in loss mitigation and damage control - and keep you compliant.

Blue Print
What happens if we don't?

 Not knowing what to do in a cybersecurity crisis situation will have far-reaching consequences for your organization.  

 

You will be non-compliant with your industry's regulations.

Regulators want your risks to be as low as possible, and sensibly require applicable companies to have a mature and actionable Cyber Incident Response Plan, complete with highly detailed scenario-specific playbooks, escalation procedures, roles and responsibilities, contacts, and much more. For example, PCI DSS Requirement 12.10 obligates entities to “Implement an incident response plan" and to "be prepared to respond immediately to a system breach.”

Your incident-related losses will increase dramatically.

While it is difficult to say exactly what kind of financial impact not having an Incident Response Plan versus having one has without knowing some specifics, it is safe to say that a successful Response program can not only significantly limit the damage, but also help avoid it altogether.

Your shareholders, vendors, business partners, and customers won't like it.

In a world where companies fail to secure their infrastructure, making "Massive Data Breach" headlines a daily occurrence, your shareholders, customers and third parties associated with your organization will thank you for being diligent while keeping their best interests in mind and will repay with loyalty and further prosperity for your business.   

OK, so you need an IR Program.

But...

Everything that's on the market right now is either very generic and difficult to operationalize, or prohibitively expensive (we're talking well into six figures) for small to medium size businesses. Not to mention, it will take 4-6 months on average to create, refine, and start using the newly created Cyber Incident Response program.

This is why we created the first-ever Cyber Incident Response Program in a Box.

A highly customized and comprehensive Cyber Incident Response Plan, a collection of detailed, step-by-step Playbooks, a set of training simulations (Tabletop), dozens of accelerators, and expert operationalization support - all in one product.

The IR Box is perfect for you if you are looking to:

Comply

You need to meet regulatory compliance or insurance requirements regarding having an Incident Response program.

Define

You are looking to create a comprehensive Incident Response program for your organization this year, but are hesitant to spend six figures on it.

Accelerate

You need a solid base for a fully custom Incident Response program and want to save 2-3 months researching and drafting the initial content.

What is the IR Box exactly?

 In a nutshell, everything you need to have a Cyber Incident Response program tomorrow. But more specifically...     

The Plan

A highly detailed Cyber Incident Response Plan that provides much-needed crisis management context and guides the Response efforts within all relevant departments in your entire organization, and even outside of it. It also contains custom templates for rapid communications, forensics, auditing, reporting, escalation and much more.

 

Like the rest of the IR Box, the Plan is specific to your industry and consists of the following.     

Processes

Detailed guidance on incident severity classification, correct playbook selection, escalations, communications, business continuity, 3rd party interactions, change and asset management, and more across all 6 stages of the Response process.

People

Cross-function collaboration is key during an incident; that is precisely why the Plan describes who, when, and how performs which actions for maximum efficiency, as well as outlines each team's structure, RACI, backups, roles and interactions.

Accelerators

Time and resources are everything in a crisis; we provide detailed plug-and-play templates and guidance for everything from reports, status tracking and email wording to contacts and law enforcement communications so you don't waste either.

This is not a generic one-size-fits-all document either, as your business is different from massive Fortune 500 companies in a number of ways.

Personnel: some positions may be combined in one person in a smaller company, which would typically be carried out by separate employees in a larger organization. Typically, 1-2 people may find themselves dedicated to security, and probably as a side responsibility to their primary non-security role.

 

Training: any staff member is unlikely to have received training specifically related to cybersecurity.

 

Tools: buy what you can, and improvise with what you can obtain free of charge. Most valuable tools should be the ones that automate the security detection process, in order not to pull employees (who are already overwhelmed) into different directions.

 

Time: staff is likely working on multiple projects at a time, so holding long meetings is not sensible or possible.

We did our best to make sure that this plan caters specifically to small and medium-sized businesses.

The Playbooks

We use our expert knowledge of the cyber threat landscape and the results of a thorough risk assessment of your organization's industry to create highly technical Cyber Incident Response Playbooks - hands-on, detailed, and specific to the very particular and unique cyber threat challenges that your business is facing.

Each Playbook provides step-by-step guidance on how to resolve a specific cyberattack scenario most efficiently, minimizing stress, effort, and financial losses across all stages of the SANS Incident Response process.

Ransomware

Phishing

DDoS

Network

The Tabletop

A Cyber Tabletop Exercise is an event-driven cyber crisis simulation exercise where key Cyber Incident Response Team (CIRT) members of an organization assemble in a semi-formal setting to discuss their roles and actions during a cyber-related emergency and as such practice an optimal response to a cyber crisis situation.

Wembley Partners' expert facilitators have created a guided virtual exercise (up to 4 hours of content) that walks the participants through a bespoke scenario crafted beforehand based on threats and risks particular to your industry, providing action triggers ("injects"), benchmarking and decision-making assistance where needed.

The Support

Not sure what to do with all this? We've got you covered - the IR Box includes 10 free hours of expert operationalization support, as well as unlimited ongoing assistance, Q&A, and content updates.

 

Our senior consultants with subject matter expertise in Cybersecurity Crisis Management and Digital Forensics will answer your questions, help further customize the IR Box if needed, guide you through the content, and assist with implementing and operationalizing the program.

Experts

Leading Experts

This principle has been at the core of our philosophy from Day One. We strongly believe that excellence in serving our clients is the norm every step of the way, and that stellar leadership is impossible without deep subject matter expertise at every level of the hierarchy.

This is precisely why we make sure that every member of the Wembley Partners team that you work with - from C-suite to Analyst - is an expert in their particular field.

Consultation

The AEGIS™

You'll receive unlimited sandbox access to AEGIS - Wembley Partners' breakthrough cyber threat intelligence aggregation platform that collects, analyzes, and processes data across 28+ global sources within the Surface, Deep and Dark Web and combines it together using cutting edge Artificial Intelligence algorithms.

Want to learn more about AEGIS?
To summarize...

 When you purchase Wembley Partners' Cyber Incident Response Program in a Box for small to medium-sized businesses, you're getting the following:     

1

Detailed Cyber Incident Response Plan.

A highly detailed Cyber Incident Response Plan that provides much-needed crisis management context and guides the Response efforts within all relevant departments in your entire organization, and even outside of it.

4

Cyber Incident Response Playbooks.

Four highly technical Cyber Incident Response Playbooks - hands-on, detailed, and specific to the very particular and unique cyber threat challenges that your business is facing - covering Ransomware, DDoS, Phishing, and Malicious Network Behavior scenarios.

1

Digital Cyber Incident Response Simulation (Tabletop) Exercise.

A guided virtual exercise (up to 4 hours of content) that walks the participants through a bespoke scenario crafted beforehand based on threats and risks particular to your industry, providing action triggers ("injects"), benchmarking and decision-making assistance where needed.

10

Hours Of Expert Operationalization Support.

Our senior consultants with subject matter expertise in Cybersecurity Crisis Management and Digital Forensics will answer your questions, help further customize the IR Box if needed, guide you through the content, and assist with implementing and operationalizing the program.

Unlimited Sandbox Access to the AEGIS Cyber Threat Intelligence Platform.

Unlimited sandbox access to AEGIS - Wembley Partners' breakthrough cyber threat intelligence aggregation platform that collects, analyzes, and processes data across 28+ global sources, supporting threat hunting, digital forensics, and cyber incident response activities.

 
Ready to kickstart your
Cyber Incident Response program?

 Contact us to get pricing, schedule a demo and a Q&A session using the form below.     

Canada  |  United Kingdom  |  USA

info@wembleypartners.com

  • Twitter
  • LinkedIn
Send Us a Message

© 2017-2020 by Wembley Partners Ltd.

  • White LinkedIn Icon
  • White Twitter Icon
  • White Spotify Icon