
Services
Kaspersky Advanced Cyber Incident Communications
Upskill your corporate communications team to manage your brand reputation in the event of an advanced or unknown cyber-attack
Overview
Tailored training solutions backed by leading cybersecurity expertise.
Due to the nature of advanced or unknown attacks, operational security is heavily dependent on technology and real-time cybersecurity insights – today's communicators need to operate securely.
Reputation management in the event of an advanced or unknown cyber-incident.
With increasing regulatory pressures, knowing how to behave while under attack not only minimizes potential reputational damage, but can also greatly mitigate direct financial losses.
A thorough understanding of the cyber-incident landscape for corporate communicators.
Knowing how to distinguish and identify different types of threats is crucial to managing communications with external audiences.
Tailored insert for advanced or unknown cyber incidents for the crisis communications manual.
To comply with the new benchmark in handling communications in the event of advanced or unknown cyber incidents, a new type of OpSec knowledge is required for inclusion in the crisis communications manual.
An email subscription service giving corporate communications advice on new advanced threats as they emerge
The only way to ensure that advice is up-to-date in an ever-changing threat landscape is through regular updates. Our subscription service is designed to provide corporate communicators with clear and simple messaging about new threats, which can then be used with all internal and external audiences.
The Threat
The contemporary threat landscape requires a specialized approach:
The average targeted attack remains undetected for more than 214 days
Traditional security solutions aren't effective against current threats
Supply chains and trusted third parties can become attack vectors
80% of targeted attacks are initiated via email attachments or links
Two thirds of targeted attacks involve social engineering
Credentials can be stolen through stealth activity