Skip to main content
Cyber Defense TacticsCyber Defense Tactics
HomeLearnResourcesBlogCommunity
Cyber Defense TacticsCyber Defense Tactics

Learn defensive security, leverage AI for cyber defense, and join a community of security professionals.

Learning

  • Blog
  • Resources
  • Newsletter

Community

  • Discord
  • YouTube
  • About

Legal

  • Privacy Policy
  • Terms of Service

© 2026 Cyber Defense Tactics. All rights reserved.

A Carbene.AI Project

Back to Playbook Library

Threat-Specific

Response procedures for specific attack types like ransomware, BEC, and insider threats

7 playbooks2 free

Free Playbooks

Phishing Response Basics

beginner

Essential steps for responding to a reported phishing email, from initial triage to remediation.

6 steps8 checklist items30-60 min

Malware Triage Fundamentals

beginner

Basic procedures for initial malware analysis and containment when malware is detected on a system.

6 steps10 checklist items1-2 hours

More Playbooks

Ransomware Response Playbook

advanced

Comprehensive response procedures for ransomware attacks, from detection to recovery.

6 steps10 checklist itemsMultiple days

Business Email Compromise (BEC) Response

advanced

Response procedures for BEC attacks including wire fraud attempts and executive impersonation.

5 steps10 checklist items2-4 hours initial, ongoing

Insider Threat Investigation

advanced

Procedures for investigating potential insider threats, balancing security with legal and HR considerations.

5 steps10 checklist itemsDays to weeks

Data Exfiltration Investigation

advanced

Investigation procedures for suspected or confirmed data exfiltration incidents.

5 steps12 checklist itemsDays to weeks

Cryptominer Detection and Response

intermediate

Procedures for detecting and responding to cryptocurrency mining malware on systems.

5 steps10 checklist items1-3 hours

All Playbooks Are Free

Step-by-step procedures, checklists, and communication templates for every incident type — no account required.