USM TECHNOLOGY
  • About Us
    • Who We Are
    • Testimonials
    • Our Referral Program
    • Locations >
      • Dallas/Fort Worth TX
      • Houston TX
    • Careers
  • Services
    • Flexible IT Solutions >
      • Servers & Networks
      • IT Projects
      • Microsoft Cloud
      • License Management
    • Cybersecurity >
      • 1 Day Deep Dive
      • Penetration Test
      • Cyber Incident Response Workshop
      • vCSO
      • Advanced Security 2023
      • Cyber Projects
      • Compliance
  • Resources
    • Cyber Storm Book
    • Incident Response Guide
    • Free 15 Minute Consult
    • Phishing Simulation
    • Dark Web Scan
    • USM Blog
  • Client Portal
  • Contact Us

Cyber Incident ​Response Workshop

A Small Group 12-Week Workshop To Help You Get Your Cybersecurity Incident Response Plan Completed, Budgeted And Approved! 

The Technology Landscape Has Forever Changed

2021 was the worst year for cyber-attacks in history. As was 2020 before it, and 2019, and 2018... 2022 is already tracking to be another year fraught with organizations’ worst nightmares becoming a reality. The uncomfortable truth is not taking consistent action on cybersecurity holds a great deal of risk. It is tempting to assume that what has worked in the past for avoiding cyber-attacks will continue to hold true moving forward. However, we are in a landscape which has new vulnerabilities being constantly and aggressively searched for by countless adversaries. They are counting on you to take no action.
Let's Get Started

Taking Aim At Cyber Response & Recovery

This program is aimed squarely at IT Leaders who believe that preparing to respond to, and recovery from, a cyber-attack is their most fundamental duty.  We focus on making tactical, real-world plans and processes so that you have the tools and direction you need to handle a cyber-attack.
Our workshop is designed as an accelerator, generating your own cybersecurity incident response plan quickly and effectively, so you can make a real difference in your organization’s cyber resilience and get what all IT Leaders truly want, a better night’s sleep.
Picture

What You’ll Get By Participating

A Guiding Hand

Building an Incident Response plan takes tremendous energy and time.  Through our workshop, we are able to accelerate your buildout by providing expert guidance, easy to use tools, and ready to go templates to make the task manageable without requiring excessive time.
In this 12-week accelerator program you will meet with the accelerator group each week for 1-hour, followed by 2-3 hours of take-away tasks to complete with your internal IT team.  You will be grouped with peers so that you may leverage each other's experience and insights as you work towards the same goal.  Our blend of expert assistance and peer collaboration will provide you with a ready-to-go, comprehensive Incident Response plan in just 12-weeks!

Actionable Items and Insights

  • ​Gain insights into the areas of your Cyber Insurance Policy (coverage limits, exclusions, pitfalls & resources, etc.) which impact the way your organization responds to a Cybersecurity Incident.​
  • Establish your Response Team Membership templates to collect team member details and assign membership to Incident Response Teams.
  • Incident Response Process workflows you can adjust to fit your organization’s needs and generate your Incident Response Levels. These levels classify the impact of a cyberattack and calibrate the intensity of your response.​
  • Templates you can use to gather critical data (technology, equipment, key contacts, etc.) and identify processes and dependencies that directly impact your Incident Response Plan.​
  • ​Incident Response Playbook templates you can tailor for your organization.  These Playbooks are designed to provide a list of action items when responding to a specific cyberattack.​
  • Guidance on conducting your first tabletop exercise with Incident Response scenarios you can use within your own tabletop sessions.​
  • ​Identification of the key Incident Response areas requiring periodic review and recurring maintenance activities you need to ensure your best chance for quick recovery.

When, Not If...

Hackers have the advantage of being able to probe until they find just a single weakness in our infrastructure before launching their attack. As IT Leaders, we need to be 100% right all of the time. In today's cybersecurity landscape it is no longer a question of 'if', but 'when' a cyber-attack will affect your organization. With cybercriminals ramping up for another historic year, it is time to prepare for your response and recovery!​

Get Started Now!

USM Technology
​Cyber Incident Response Workshop

$9,998
​
I'm Ready to Take Action
Picture
Stephen Cracknell, CEO & Founder
Picture
Kevin Brockus, MBA, CISSP
Vertical Divider

There Is Zero Risk And The Benefit of Immediate Action Is Immense

Taking you from zero to hero in only 12-weeks is no easy feat; however, I am convinced that at the end of this program you will have a cybersecurity response plan ready for action.  It's easy to get overwhelmed with wading through the countless online resources trying to construct your own cybersecurity incident response plan.  Let us help you create your own plan using best practices and expert guidance.  We know there is immense value in our program.  If you participate in the full 12-week program and do not find value, you have my word that we will refund you the entire amount of the workshop.
“USM's team has proven to be both competent and capable across all our engagements...The best parts about working with USM is that we now have a Trusted Advisor!”
Craig York
​VP of IT at ​Heritage Health Solutions
USM Technology is one of our most valued business partners! We know that USM is dedicated to Peregrine’s success. When they help us with our technology planning and budgeting, they offer strategies to help us remain secure while keeping our technology costs low. We have not for a single day regretted our decision to partner with USM. They are truly exceptional!
Rebecca Gibbs
Vice President at ​Peregrine Investments

Shifting Your Focus

Prevention is Never Perfect

Picture
Many organizations only focus on the 'Left of Boom' concept, implementing an assortment of technologies specifically designed to stop hackers from gaining access to the organization's network and resources.  Trusting your technology to stop hackers from accessing your systems is not an absurdity; however, even with the most robust protections hackers may still gain access to your organization's systems.  Think of all the mega organizations that have experienced cyber incidents in the recent years, each having an astronomical IT security budget. Technology is an important aspect of cybersecurity; however, it neglects the hard truth that hackers will likely gain access to the organizations systems eventually.  It is vital to plan for the aftermath of a successful cyber-attack and shift focus to the 'Right of Boom' where the organization will respond to, and recover from a cyber incident.  

Avoid a 'Resume Producing Event'

Picture
When a cyber incident occurs, it will not be on your schedule, more likely it will be during the most inopportune time (hackers love extended holiday weekends).  Walking into the office to learn that a cyber incident has occurred is never an enjoyable scenario, but you can ensure that such an eventuality does not lead to a 'resume producing event' through pre-planning, preparation, and testing.  Shifting focus to the 'Right of Boom' allows your organization to develop clear, actionable plans for responding to, and recovering from a cyber incident. 
When a cyber incident occurs, time is of the essence and immediate, thoughtful action is vital.  Don't wait for a live cyber event to instigate the development of your plan, prepare for the future now.
I'm Ready to Focus on the "Right of Boom"
Office Locations
DALLAS OFFICE
202 S. Austin Drive
Allen, Texas 75013
​Map

HOUSTON OFFICE
2929 Allen Parkway
Houston, Texas 77019
Map

Telephone

Dallas: 
214-390-9252 (Sales/Finance)
461-551-9922 (Support)
​
Houston: 
​832-975-0035 (Sales/Finance)
​832-968-6664 (Support)

Hours

Monday - Friday (7:00 am - 6:00 pm)

Stay Connected with USM Technology
Newsletter SignUp
USM Blog

​Contact Us
​
Privacy Policy
Picture
  • About Us
    • Who We Are
    • Testimonials
    • Our Referral Program
    • Locations >
      • Dallas/Fort Worth TX
      • Houston TX
    • Careers
  • Services
    • Flexible IT Solutions >
      • Servers & Networks
      • IT Projects
      • Microsoft Cloud
      • License Management
    • Cybersecurity >
      • 1 Day Deep Dive
      • Penetration Test
      • Cyber Incident Response Workshop
      • vCSO
      • Advanced Security 2023
      • Cyber Projects
      • Compliance
  • Resources
    • Cyber Storm Book
    • Incident Response Guide
    • Free 15 Minute Consult
    • Phishing Simulation
    • Dark Web Scan
    • USM Blog
  • Client Portal
  • Contact Us