Kaspersky Advanced Cyber Incident Communications

Empowering corporate communications professionals to handle crisis communications and to develop appropriate assets in the event of an advanced or unknown cyber-attack (APT), minimizing damage to your corporate reputation and brand. Backed by cybersecurity expertise and using actual case studies, the training provides a complete toolset for professional communicators facing the latest wave of highly sophisticated and complex cyber-incidents.

What We Offer

Best-of-breed training that prepares corporate communicators to achieve the new benchmark we have set in reputation management while under attack from advanced or unknown cyber-incidents.

In Use

  • Upskill PR professionals to new standards in cyber-incident management

    With the emergence and growth of advanced and unknown cyberattacks, corporate communicators need to better understand how to operate securely while managing incidents and forensics. Part of our new benchmark on how to communicate securely with internal and external stakeholders involves ensuring that the severity classification applied to an incident should only ever be capable of downgrade: never of upgrade.

  • Three training modules that can be combined or applied separately

    Kaspersky Advanced Cyber-Incident Reputation Management consists of three modules which can be used together, or can function as stand-alone training, depending on your organization’s specific needs. Each module will equip your corporate communications team with valuable insights into the new benchmark, ranging from an awareness-raising keynote to a complete and tailored solution for your unique communications environment.

The Threat

The contemporary threat landscape requires a specialized approach:

  • Scan

    The average targeted attack remains undetected for more than 214 days

  • Scan

    Traditional security solutions aren't effective against current threats

  • Scan

    Supply chains and trusted third parties can become attack vectors

  • Scan

    80% of targeted attacks are initiated via email attachments or links

  • Scan

    Two thirds of targeted attacks involve social engineering

  • Scan

    Credentials can be stolen through stealth activity