cyber breach workshop.
overview.
The cyber breach workshop from IP Performance delivers a fully interactive session for senior leadership on the topic of dealing with a cyber security incident.
Throughout the workshop, participants will be walked through the development of a structured workflow to respond to breaches, which will integrate with existing processes.
Non-technical stakeholders are encouraged to attend, with the workshop covering not just technical responses to breaches but also internal governance, PR, and more.
scenarios covered.
Throughout the workshop, the instructor will help you to understand your own top risks, as well as covering four scenarios in detail:
-
ransomware
-
ddos
-
credential stuffing
-
data leak
watch the demo
Whether you're looking for a virtual or in-person event, we have the team and the tech on hand to support you in developing your comprehensive incident response plan.
check out our other Out of the Box Games.
Explore our range of ready-made cyber security escape room games, interactive workshops and CTF events, each designed to address key cyber security topics. These solutions are perfect for quick deployment and can be easily integrated into your existing training programme or event agenda.
The Heist.
Someone's left their bag on a train... using your hacking skills can you steal money from their back account before they notice?!
Learn about OSINT and privacy in this interactive and fun scenario.
Elementary.
Mr Potts is concerned when he receives a letter demanding payment in exchange for not releasing his factory blueprint.
We cover insider risk, code breaking, and password security in this entirely technology free scenario.
build breakout.
Test your DevSecOps skills in this CTF challenge, expertly crafted by the team at Punk Security.
By tackling all of the OWASP Top 10 CI/CD Risks, participants can learn and enhance their skills through play!
under the hood.
Ideal for larger audiences, our interactive theatre workshop dramatises a cyber attack and subsequent data breach at a major automotive company.
As the story unfolds, the audience must try identify the insider threat.
trusted by
MoD
C4
Chelmsford
Trading Standards
nclose
logicalis
global
recorded future
KnowBe4
trend
freshworks
csk
bae
express vpn
starr
SHMA
LV
Admiral