CRISIS RESPONSE COMMITTED GLOBAL EXPERTISE

Similar documents
COPYRIGHTED MATERIAL. Contents. xv xxi. Preface About the Web Site

People Assets Reputation

keeping executives safe

ACTIVE SHOOTER RESPONSE CAPABILITY STATEMENT. Dynamiq - Active Shooter Response

THE CYBER SECURITY PLAYBOOKECTOR SHOULD KNOW BEFPRE, DURING & AFTER WHAT EVERY DIRECTOR SHOULD KNOW BEFORE, DURING AND AFTER AN ATTACK

CYBER INCIDENT REPORTING GUIDANCE. Industry Reporting Arrangements for Incident Response

Preparing your C-Suite for a Cyber Crisis

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.

M&A Cyber Security Due Diligence

Cyber Attack: Is Your Business at Risk?

CyberEdge. End-to-End Cyber Risk Management Solutions

Strategic Security Analyst

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Cyber Security Strategy

A company built on security

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Position Title: IT Security Specialist

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Incident Response Services

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

It s Not If But When: How to Build Your Cyber Incident Response Plan

Salamanca Risk Management. Global Security and Risk Management Solutions. www. salamancarm. com

Security Director - VisionFund International

Jeff Wilbur VP Marketing Iconix

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Global Security Advisor

POSITION DESCRIPTION

falanx Cyber ISO 27001: How and why your organisation should get certified

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Business continuity management and cyber resiliency

POSITION DESCRIPTION

Global Risks Peculiar to Resorts: Richard G. Hudak Managing Partner Resort Security Consulting Inc.

How to be cyber secure A practical guide for Australia s mid-size business

SRM Service Guide. Smart Security. Smart Compliance. Service Guide

CYBER INCIDENT RESPONSE. cfcunderwriting.com

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Business Continuity Planning Keeping Pace with New Technology

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

Best Practices for Campus Security. January 26, 2017

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Number: USF System Emergency Management Responsible Office: Administrative Services

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

The Impact of Cybersecurity, Data Privacy and Social Media

Cyber risk Getting the boardroom focus right

Avanade s Approach to Client Data Protection

Cloud solution consultant

CYBER RESILIENCE & INCIDENT RESPONSE

Fighting Hunger Worldwide. WFP Field Security Keeping you safe & secure

EMERGENCY/DISASTER RESPONSE TEAM

Role Type Pay Band Location Duration Reports to: To manage, enhance and embed the British Council Nigeria Security Risk Management function.

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

OPTIMUM DETECTION WITHOUT COMPROMISE. DRA_0291_Scanna_CapBro_AW.indd 1 21/02/ :16

Security of Information Technology Resources IT-12

to Enhance Your Cyber Security Needs

Cloud solution consultant

Building a BC/DR Control Library and Regulatory Response Program

MANAGEMENT OF INFORMATION SECURITY INCIDENTS

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Business Continuity Policy

uanacia 1+1 MARINE SECURITY OPERATIONS BULLETIN No:

External Supplier Control Obligations. Cyber Security

BUSINESS CONTINUITY MANAGEMENT PROGRAM OVERVIEW

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

BREAKING BARRIERS TO COLLABORATE WITH THE C-SUITE

Information Security Controls Policy

Medical Device Cybersecurity: FDA Perspective

CCISO Blueprint v1. EC-Council

Google Cloud & the General Data Protection Regulation (GDPR)

Global Statement of Business Continuity

Data Breach Preparation and Response. April 21, 2017

An Introduction To Security Planning

BEST SECURITY PRACTICES FOR PROTECTING SURFACE TRANSPORTATION AGAINST TERRORISM AND SERIOUS CRIME. Brian Michael Jenkins Research Associate

Vulnerability Assessments and Penetration Testing

Cybersecurity The Evolving Landscape

POSITION DESCRIPTION

MOBILE LIVE SHARE SMS FAX

Balancing energy and environmental demands

Responding to Cybercrime:

NHS Gloucestershire Clinical Commissioning Group. Business Continuity Strategy

THE STRATEGIC POLICING REQUIREMENT. July 2012

CYBER INCIDENT RESPONSE. cfcunderwriting.com

7 th BICSI Southeast Asia Conference 2009 Building the Next Generation Broadband Network

RANSOMWARE PROTECTION. A Best Practices Approach to Securing Your Enterprise

SUPERYACHTS SECURITY SERVICES

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

MNsure Privacy Program Strategic Plan FY

This is UNDAC United Nations Disaster Assessment and Coordination

Information Technology Branch Organization of Cyber Security Technical Standard

Managing and Preparing for Cyber Incidents

Changing the Game: An HPR Approach to Cyber CRM007

Cyber Security Beyond 2020

NDIS Quality and Safeguards Commission. Incident Management System Guidance

Appendix 3 Disaster Recovery Plan

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Legal Aspects of Cybersecurity

Data Management and Security in the GDPR Era

Transcription:

CRISIS RESPONSE COMMITTED GLOBAL EXPERTISE

Since 1990 we have been committed to helping clients understand the threats to their people, information, property and reputation. Our global team provides you with the expertise to mitigate and manage security risks so that you can focus on opportunities and meet objectives. COMMITTED GLOBAL EXPERTISE

COMMITTED We develop long-term, collaborative client partnerships, that put you in greater control. Our commitment to an immediate response when you need us offers certainty and peace of mind. GLOBAL We are a global team that provides a local service. With extensive resources on the ground around the world, we understand your culture and speak your language. EXPERTISE We attract and develop the highest-calibre of specialists. Our team has wide experience of the evolving challenges faced by every industry sector around the world. OUR VALUES

BRINGING YOU THE MOST EXPERIENCED TEAM A GLOBAL SERVICE DELIVERED LOCALLY We carefully select and train our crisis response consultants from a variety of backgrounds including the military, law enforcement, intelligence agencies and commercial security sector. You can be certain that the team we deploy to help you is of the highest-calibre and working to Best Practice standards. PUTTING YOU IN CONTROL A crisis is by definition, a loss of control. Our crisis response consultants provide you with practical advice, options and scenario planning based on tried and tested procedures. Our primary objective is always the successful resolution of the crisis, to put you back in control.

HOW DO WE HELP? Our four-stage process 1 Rolling assessment of the situation as it develops 2 Formulation of an effective strategy and provision of advice on the best tactics to resolve the situation 3 Crisis communications, both internal (e.g. families, colleagues or investors) and external (e.g. authorities, media, customers, competitors) 4 Mitigation of future risk. Advice on business continuity and reputation protection Typical response INCIDENT NYA Response Management provides immediate support, contacting the client within 20 minutes (typically within 10 minutes) of notification. Following this initial discussion, NYA24 produce a detailed assessment of the threat or perpetrator based on open sources and previous case history. DEPLOYMENT Depending on the type of incident and support required, NYA deploys up to four crisis response consultants or subjectmatter experts (see Capabilities). Our team will arrive within 24 hours, subject to immigration or other regulatory requirements. RESOLUTION Upon resolution of the incident, NYA remains on site to conduct a detailed debrief, an essential part of any rehabilitation process or future risk mitigation. THROUGHOUT The client and crisis response consultants are supported throughout by Response Management and NYA24.

WHAT TYPE OF INCIDENTS DO WE HELP WITH? NYA has responded to 80-100 cases each year since 1990, so our experience of incident types is broad. Regardless of the type of incident, the operating environment or complexity, we are committed to advising and supporting you through to resolution anywhere in the world. INCIDENTS Act of Terrorism Assault Blackmail Detention Disappearance Extortion Hijack Hostage Crisis Sabotage Stalking Civil Commotion Cyber Extortion Deprivation (Denial of Access) Emergency Repatriaton Employee Dishonesty Kidnap Product Tamper Radicalisation of Workforce Reputation Risk Law Enforcement Liaison Media Monitoring Family and Stakeholder Liaison Cyber Incident Response Physical Security Support CAPABILITIES Crisis Communications Incident Management Advice Trauma Stress Management Product Recall Specialists NYA24

TYPICAL RESPONSE CASES SITUATION 1 TAMPER Product Tamper 2 CYBER Kidnap RESOLUTION A dairy farm and food manufacturer received a letter threatening to contaminate milk with a poisonous substance unless 5000 was received. The letter accused the farm of cruelty to animals and threatened to go public. NYA deployed two Response Consultants to the farm and assessed the perpetrator s communications for Intent and Capability. A determination was made as to the possible future actions of the extortionist, which was presented to the client along with recommended actions. Specific advice was provided on Crisis Communications within and outside the organisation with a particular view to reputation protection and media management. A charity found their computer files had been encrypted and received a notification saying that access would only be granted after they paid a Bitcoin ransom. NYA deployed two Response Consultants experienced in Cyber Extortion to the charity premises, where they assessed the situation to understand whether the client had adequate backup that could be reinstalled after a system erase. The backup was inadequate and an assessment was made to pay the ransom. Cyber Incident Response 3 KIDNAP APPROACH NYA s technicians scoped the extent of the data compromise. An armed gang kidnapped three of a multinational corporation s staff in Central Asia. The client s local office notified corporate headquarters immediately, who in turn activated their crisis management plan. NYA deployed a team of two consultants to Central Asia. At the client s request, they embedded into the Incident Management Team (IMT) to provide advice. A consultant was deployed to the client s headquarters to ensure a joined-up strategy. NYA24 produced threat and context analysis to inform the IMT strategy discussions. Response Management acted as a hub coordinating the deployment and delivery of the four-stage process. Specialist breach lawyers were brought in by NYA to advise on compliance issues and reporting timelines. Advice was provided on Crisis Communications to deal with internal and external stakeholders including donors beneficiaries and the media. NYA s established methodology provided reassurance to all of those affected by the incident and minimised risk to life. The consultants coached a communicator and provided support throughout the negotiations which led to the release of all victims within five days of abduction. NYA coordinated delivery of post-incident counselling for the victims along with a review and assessment for the client.

CONTACT US LONDON 40 Lime Street London EC3M 7AW United Kingdom NEW YORK 77 Water Street New York, NY 10005 United States SINGAPORE One Raffles Place Tower 1 1 Raffles Place Singapore 048616 Singapore nyarisk.com