CYBER INCIDENT RESPONSE PLAYBOOK

Too many organizations are experiencing the effects of cyber events, whether their own or via one of their partners, vendors, etc.

Having a strong cyber security posture is step 1, educating your staff is step 2. Step 3 is ensuring that if something does happen, your organization is ready to respond quickly, decisively and efficiently!

The Cyber Playbook Provides Templates for the Following:

  • First Response Actions
  • Creating a Cyber Incident Response Kit
  • Developing Your Cyber Incident Response Team
  • Internal
  • External
  • Creating Contact Lists (Staff, Clients, Vendors, etc.)
  • Communication Plan
  • Business Continuity Plans
  • Event Response
  • Simulation Guides
  • Understanding and Preparing for Different Types of Cyber Threats

The Cyber Playbook Includes:

  • A self-paced step-by-step guide to create your Playbook
  • A checklist for the Cyber Incident Response Team
  • An information sheet for staff so they know what to do and what to expect
  • Roles and responsibilities guides for each role within the Cyber Incident Response Team

CIPS Webcast: “Cyber Incident Response Playbook”

Hosted by CIPS – Canada’s Association of I.T. Professionals, this webcast features Trish Bishop (Director of Professional Services, Horizon Computer Solutions) as she facilitates an engaging discussion on effective cyber incident response strategies. Learn how to develop a structured incident response plan, mitigate risks, and protect your business from evolving cyber threats.

Watch the full webcast below to gain valuable insights into cybersecurity best practices.

🔹 Follow CIPS – Canada’s Association of I.T. Professionals:


Gone in 60 Seconds The Alarming Speed of Cyber Attacks

Presented by Horizon Computer Solutions and Arctic Wolf, this webinar, hosted by Christopher Fielder, reveals how even novice cybercriminals can launch devastating attacks in minutes. Through a live demonstration, it showcases:

🔹The rapid execution of cyberattacks
🔹 Common vulnerabilities and poor security practices
🔹 The importance of early detection and strong defenses

Learn how to stay ahead of evolving threats with proactive cybersecurity strategies.