Professional Documents
Culture Documents
If you
need help, refer to the instructional video.
Replace the red text on each slide with your information and
change the text color to black or white, depending on the
background. You can change the font size, if needed.
Attack Category
Company/Affected parties
Company
Description and
Breach Summary
Event 1
1 Provide 6 chronological events or milestones related to this attack. This can
include related events before and after the attack.
Event 2
2
Event 3
3
Timeline
Event 4
4
Event 5
5
Event 6
6
Vulnerabilities
In this box, provide an overall vulnerability summary.
Then provide a summary of 4 specific vulnerabilities for your case in the boxes below.
• 1 • 1
• 2 • 2
• 3 • 3
• etc. • etc.
Costs and
Prevention