Fighting Cyber Attack Unit that addresses the attitudes and behaviours of team managers and employees in the face of cyber attacks.
We know that cyber-attacks take place at times when teams and their managers are least available (weekends, nights, reduced HR teams, etc.) so we propose solutions to best deal with this type of situation.
Read also Terrorism Training Armed Individuals Hostages
FILM OF A CYBER ATTACK
Many companies are victims of cyber attacks and very often do not know the purpose of the attacker: ramsonware, ideology, politics, competition… To tell the truth, no matter the motive, the reason or the motive, the result can be catastrophic for the company if all employees are not made aware of the possibility of this type of aggression and especially trained in the behaviours and attitudes that can help them save.
No matter how many walls of computer technology and virtual bastions are built, the breach, flaws and weaknesses will be in human behaviour.
A cyber attack often comes at a time when there are fewer staff (at night, break times, holiday periods, reduced staff, etc.) to set up a computer intrusion operation.
Whatever the case, staff must be able to respond quickly and effectively.
Read also: Anti-counterfeiting
THE FIRST STEP IS THE “TRIGGERING OF THE ALERT”.
the attack will be taken into account by the IT monitoring service, one of whose missions is to detect the viral intrusion as soon as possible
Within the company there are dozens of people who each work in their own sphere of competence to ensure the smooth running of the work tool. In the event of a cyber attack, each person must be able to contribute their professional capital either to counter the attack or to compensate for it by proposing parallel solutions, solutions which will have had to be tested and then confirmed.
“MANAGEMENT AND ADRENALINE”
Take into account that an attack, whether physical or virtual, triggers an anxiety-inducing phenomenon. If the attack is minor, the adrenaline level of the personnel will not be affected more than that, but if the attack is brutal and consequent, general panic may set in.
Take into account the physiological reactions of each person with an adrenaline rush that can totally block initiatives, paralyse any decision if you are not trained. As the old saying goes: “easy training, hard work – hard training, easy work”.
Read also: Burglaries and agressions prevention
To do this, it is necessary to set up a protocol that will define the “priorities” in view of the description of the situation. It is necessary to consider several scenarios in order to anticipate the cyber attack.
As soon as the attack is launched, the notion and management of time is essential, primordial, even vital for the company. Any minute, any quarter of an hour lost can be fatal if priorities have not been established and validated beforehand.
The virulence of the attacks is all the more important as the attackers have equipment in relation to their targets and the interests they are pursuing.
“CYBER ATTACK = STATE OF WAR”
The company must be able to draw on all its human resources and even recall those who are unavailable at the time: leave, internships, sick, etc.
A period of crisis is a time of war, each decision is taken according to the situation: observation, validation or invalidation and then we start again.
Take into consideration that the virtual attack affects all the links in the company’s chain, not just the IT department, in order to counter the attack or even to take decisions that are worse than the attack in order to preserve the company’s treasure, heritage and wealth. Each department must be able to communicate with each other.
It may be that all the decisions that will be taken will resemble an industrial gas factory, but the main thing is that it does not explode. It is also possible that the company will use obsolete skills that have become important again.
Read also: False transfer orders
“COLLATERAL DAMAGE: PARTNERS, CUSTOMERS
Next, know how to manage the clientele who may be the “collateral damage” of the situation despite themselves; this is the meeting point between the real world and the virtual attack. Communicate well with partners so that they protect themselves in turn, comment on what is happening and appear responsible.
A cyber attack is a painful experience and can be fatal in the face of this kind of disaster and the damage is irreversible if you are not prepared. Raising the level of security is not an option but a burden that must be part of security development.
“COST OF THE CYBER ATTACK”
A cyber attack has a cost: delay in projects, management of the attack (overtime, employee bonuses) and possibly in the extreme case a ransomware attack even if paying plays into the hands of the attackers.
“MAFIAS AND CYBER CRIME”
It is important to know that all the mafias in the world are moving towards cybercrime, a situation that is also very much taken into account by the ANSSI.
If total immunity seems unattainable, the responsibility of the head of the company is to put himself out of danger from these virtual attacks. To do this, investing in the training of his staff in this type of situation will prove judicious.
Realistic situations and stress
Our partner places your teams in a realistic situation of cyber attacks where each of the actors must take the high impact decision(s) with a minimum of information.
The participants are brought together in a room specially designed for this type of exercise.
Unique and innovative training
The training participants are fully immersed for a period of one to two hours in a cyber-attack.
Reaction and interaction
The exercise highlights the attitudes and behaviours of each person faced with the actions to be taken, the reactions and interactions caused by the situation. The solution will come from them.
The Anti-Cyber Attack exercise concludes with an in-depth debriefing to then communicate the keys and tools of crisis management.
Audience for the training
99% of companies are victims of cyber-attacks at least once a year.
Speakers: Company manager experienced in cyber-attack management and cyber security
Audience: IT Department, Senior Managers, Executives, Managers, Human Resources, Marketing, Sales, Legal and Finance
Number of participants: limited to 8 to 10 per session
Duration: 3 hours
Locations: Toulouse – Paris – Luxembourg