Get the full package for a comprehensive incident response plan.
Implement a robust incident response plan to protect your organisation from a data breach with our total solutions bundle.
Buy now, pay later! Enjoy the benefits of paying by purchase order with an IT Governance corporate account. Apply online today or call our service centre team on +44 (0)333 800 7000.
Strive for resilience with our most comprehensive bundle and ensure you have the measures in place to respond to and survive a breach. This bundle includes our complete solution of bestselling cyber security and data protection products and services.
Gain full visibility over the flow of personal data through your organisation with our data mapping tool, which will help you understand what personal data you process and why, where it is held and how it is transferred. Safeguard your organisation from the most common cyber threats with the Cyber Essentials scheme, and understand where your weaknesses lie with accurate, auditable risk assessments using vsRisk Cloud. This bundle also includes a full day of on-site consultancy at a time and date that suits you.
The UK government’s Cyber Essentials scheme is a world-leading, cost-effective assurance mechanism for organisations to demonstrate that the most important basic cyber security controls have been implemented. This service will help you achieve CREST-accredited Cyber Essentials certification with a lot of help from us.
This test provides a complete solution for effectively testing your IT network infrastructure and ensuring that your organisation is genuinely secure in a world of constantly evolving cyber threats. This test can be used to help meet the requirements of the PCI DSS Payment Card Industry Data Security Standard) and ISO 27001.
This bestselling toolkit is the ideal resource for anyone carrying out a GDPR compliance project. It will assist you in meeting the requirements of the regulation quickly and effectively without the need for expensive consultancy fees.
Our online tool for conducting an information security risk assessment aligned with ISO 27001. It is designed to streamline the process and produce accurate, auditable and hassle-free risk assessments year after year.
Our Data Flow Mapping Tool helps simplify the process of creating data flow maps, giving you a thorough understanding of what personal data your organisation processes and why, where it is held and how it is transferred.
Find out how to effectively manage and respond to a disruptive incident, such as a data breach or cyber attack, and take appropriate steps to limit the damage to your business, reputation and brand. This course will provide an introduction to developing a cyber incident response programme to protect your business.
Our bestselling guide is the ideal companion for anyone carrying out a GDPR (General Data Protection Regulation) compliance project. It provides comprehensive guidance and practical advice on complying with the GDPR.
This book speaks directly to information security managers, providing an insider’s view of the role and offers priceless gems from the author’s extensive experience. It walks you through a typical ISM’s year, and highlights the challenges and pitfalls of an information security programme.
You will receive access to the books, tools, software licence and training course within two working days of your purchase, and we’ll contact you at the same time to schedule your first session with a consultant.
If you’d like more information about our breach essentials bundles, or to find out which level is right for you, get in touch and speak to one of our experts today.