Webinar - What Good Looks Like. Ep 1: Cyber Incident Response
![SG_2020_INSIGHTS_HERO.jpg](https://static.wixstatic.com/media/c8c062_777344814610448580e51ff68685f79d~mv2.jpg/v1/fill/w_147,h_69,al_c,q_80,usm_0.66_1.00_0.01,blur_2,enc_auto/c8c062_777344814610448580e51ff68685f79d~mv2.jpg)
Cyber security insights
STORM's cyber security insights bring you all the latest trends in digital security, cyber insurance, incident response and more
STORM Guidance blog
See what our specialists have to say about ransomware, business email compromise, extortion, data theft and all aspects of cyber risk.
![Webinar - What Good Looks Like. Ep 1: Cyber Incident Response](https://static.wixstatic.com/media/3ebb30_842105d7409a43beb8aeae6fd59be094~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/3ebb30_842105d7409a43beb8aeae6fd59be094~mv2.webp)
![Controls Degradation](https://static.wixstatic.com/media/ecb2fe_8765ef43ec8a42af86ef561a62435b0a~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/ecb2fe_8765ef43ec8a42af86ef561a62435b0a~mv2.webp)
- Apr 28
Controls Degradation
![STORM is among the first NCSC Cyber Incident Exercising Assured Service Providers](https://static.wixstatic.com/media/ecb2fe_83b8c12a7f474abc80b71aec598a1bdb~mv2.png/v1/fill/w_316,h_178,fp_0.50_0.50,q_95,enc_auto/ecb2fe_83b8c12a7f474abc80b71aec598a1bdb~mv2.webp)
- Dec 5, 2023
STORM is among the first NCSC Cyber Incident Exercising Assured Service Providers
![](https://static.wixstatic.com/media/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.jpg/v1/fill/w_232,h_232,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.webp)
![The Epic Fail Behind MOVEit](https://static.wixstatic.com/media/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.jpg/v1/fill/w_303,h_166,fp_0.50_0.50,q_90,enc_auto/ecb2fe_cec4b23294d44ce8961fca108a5dd701~mv2.webp)
- Aug 2, 2023
The Epic Fail Behind MOVEit
![](https://static.wixstatic.com/media/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.webp)
![Cyber attack methods explained, with a twist!](https://static.wixstatic.com/media/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_fdd719b1263b4254ad5f7bd972862448~mv2.webp)
- Apr 6, 2023
Cyber attack methods explained, with a twist!
![](https://static.wixstatic.com/media/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.webp)
![Royal Mail Ransomware Negotiation Analysis](https://static.wixstatic.com/media/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_0391a12c52f04f85ab403f36bd2ee6e5~mv2.webp)
- Mar 31, 2023
Royal Mail Ransomware Negotiation Analysis
![](https://static.wixstatic.com/media/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.webp)
![How MSPs can better position themselves in the face of increasing cyber threat](https://static.wixstatic.com/media/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_ed41ae49011a483cb2701abd55a77cc5~mv2.webp)
- Jan 11, 2023
How MSPs can better position themselves in the face of increasing cyber threat
![](https://static.wixstatic.com/media/3ebb30_813665434b674662b42d847de2825885~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_813665434b674662b42d847de2825885~mv2.webp)
![UK cyber crisis calls for broader regulation in the face of economic gloom](https://static.wixstatic.com/media/3ebb30_813665434b674662b42d847de2825885~mv2.jpg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_813665434b674662b42d847de2825885~mv2.webp)
- Nov 17, 2022
UK cyber crisis calls for broader regulation in the face of economic gloom
![](https://static.wixstatic.com/media/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.webp)
![Behind the scenes of criminal black markets and the proliferation of data extortion](https://static.wixstatic.com/media/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_8aea7ee3f31b4af199081e26331d090d~mv2.webp)
- Nov 1, 2022
Behind the scenes of criminal black markets and the proliferation of data extortion
![Quantify cyber risk across your book and save the prop-form headache](https://static.wixstatic.com/media/3ebb30_66f37f070017486a8326da4b08e0fc98~mv2.png/v1/fill/w_317,h_178,fp_0.50_0.50,q_95,enc_auto/3ebb30_66f37f070017486a8326da4b08e0fc98~mv2.webp)
- Oct 14, 2022
Quantify cyber risk across your book and save the prop-form headache
![](https://static.wixstatic.com/media/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.webp)
![Risk Management Regulations Set to Hit the Cyber Market](https://static.wixstatic.com/media/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.jpeg/v1/fill/w_317,h_178,fp_0.50_0.50,q_90,enc_auto/3ebb30_b67a8c0718fa4a92b8f19c853c61291f~mv2.webp)
- Oct 7, 2022
Risk Management Regulations Set to Hit the Cyber Market
![](https://static.wixstatic.com/media/0f0b2b_7a37aff083c9498eaa23f1440082b99b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/0f0b2b_7a37aff083c9498eaa23f1440082b99b~mv2.webp)
![How Substandard Managed Service Provider Contracts are Impairing Cyber Claims](https://static.wixstatic.com/media/0f0b2b_7a37aff083c9498eaa23f1440082b99b~mv2.jpg/v1/fill/w_316,h_178,fp_0.50_0.50,q_90,enc_auto/0f0b2b_7a37aff083c9498eaa23f1440082b99b~mv2.webp)
- May 16, 2022
How Substandard Managed Service Provider Contracts are Impairing Cyber Claims