Cyber | Incident Response Planning

CYBER | Incident Response Planning

RESPONSE

Select the buttons below for Quick Links

An attack is coming.

Our mission is to empower you to effectively manage and mitigate it.

We have built a solid track record of understanding and responding effectively to cyber incidents.
Our services aim to resolve cyber security incidents quickly, efficiently and at scale, and we’re here to help you get prepared for the inevitable attack, whenever it occurs.

“2023 saw a 72% increase in data breaches since 2021, which held the previous all-time record.”

Identity Theft Resource Center 2023 Data Breach Report

Top 3 Benefits of Incident Response Planning?

Understand the risks

Assess your current governance and risk management framework effectiveness. Discover the level of unmanaged devices on your network and which users are most vulnerable.

Prioritise and plan your corrective actions

Get a true understanding of the scope of your estate and associated risk. This allows you to prioritise corrective actions to improve effectiveness.

Inform future training and develop robust security policies

This service gives you everything you need to create detailed and effective cyber security policies. It also acts as an invaluable training exercise for any relevant stakeholders.

How does Incident Response Planning work?

Step 1 – Deployment

The service is rapidly deployed and scalable, being delivered as a combination of on-site and
remote discovery and collaboration and off-site analysis, report generation and recommendation.

Step 2 – Analysis

Discovery agents are deployed at key points on your network/s (internal, cloud and hybrid) to
identify network traffic meta data and identify digital assets. Metadata on assets is processed and
analysed within our secure cloud centres and presented to our security consultants for validation
and posture assessment. No payload data is sent outside your organisation.

Step 3 – Collaboration

Consultants work with your staff to correctly classify asset criticality, relative vulnerability and
determine remediation action and priority.

Step 4 – Discovery

During discovery, we will work with your staff to review various source materials related to each individual Area of Concern (AoC) and the wider business strategy. This will ensure we understand the systems in place and the context in which they operate including valuable user-centric context.

Step 5 – Reporting

Our team will review and analyse the information gathered and provide you with a report of the
activities undertaken and recommended improvement opportunities. The report will also contain
details of our findings, the associated gap analysis and risk assessment undertaken.

Integrate to Floodlight

NCL’s Digital Operations Centre (DOC) combines NOC and SOC into one. Immediate response and clarity.

Your Secure Service Delivery Partner

FAQ