Cyber Incident Response Planner
🛡️

Cyber Incident Response Planner — Wales / Cymru

Free planning tool for schools and colleges in Wales. Build a school-specific Cyber Incident Response Plan, mapped to NCSC, Welsh Government Cyber Resilient Wales, Estyn arrangements and TARIAN / regional ROCU Cyber PROTECT guidance.

Takes around 15–25 minutes · readiness check · 10-section plan builder

✓ Free · browser-only · no account ✓ Mapped to NCSC, Welsh Gov, Estyn & TARIAN
v0.1.0 (Welsh fork) · changelog
ℹ️ Police CyberAlarm: registrations remain open and vulnerability scanning is available — a sensible free baseline alongside whatever cyber cover your local authority or insurer provides. More info ↓

Only the on-network data collector is currently paused for new installations during a planned transition period — the rest of the service continues as usual. Welsh schools' regional Cyber PROTECT support is provided through the relevant ROCU: TARIAN for South Wales, Gwent and Dyfed-Powys; NWROCU for North Wales. Both teams provide free pre-incident advice. The full PCA registration page is at cyberalarm.police.uk.

A practical baseline for any Welsh school: PCA registration, offline backups, annual NCSC-aligned cyber security training for all staff and governors with system access, and a documented Cyber Response Plan (which this tool helps you build).

💾 Cloud MIS / SaaS: do you hold your own copy of the data? If your MIS or pupil-data SaaS is supplier-hosted, you remain the data controller under UK GDPR. More info ↓

When your MIS (Arbor, SIMS Cloud, Bromcom, iSAMS, Engage, ScholarPack) or other school-data SaaS (CPOMS, MyConcern, ParentPay, M365, Hwb-hosted services) is hosted by the supplier, you are still the data controller and they are the data processor. Best practice: request and store a current export of your school's data termly, separate from the supplier's environment. If they suffer a breach, fold, or you need to migrate, you can act independently — without waiting for the supplier's recovery timeline or commercial co-operation.

Most schools never test this until it's too late. The Critical systems & impact section in the Plan Builder includes a "Last data export from supplier" field for each system; the SaaS supplier incident playbook walks the response when a supplier-hosted system is breached; the Tabletop scenario F tests this against a cloud / ransomcloud incident.

Why this matters in practice: if Arbor (or your MIS supplier) suffers a serious breach, the 72-hour ICO notification clock falls on you, not them. Without your own data copy, you can't quickly answer "what data was held?", brief parents under UK GDPR Article 34, or maintain operational continuity. Add the termly data-export task to your annual cyber calendar (Plan section 12.1).

Mapped to Welsh-context frameworks
Every readiness question and plan section is tagged
Sources verified
29 April 2026

Already started?

Jump straight to a specific section of the tool.

PLAN COVERS 10 SECTIONS
Open the plan builder →
🏫 School details
👥 Response team
📞 External contacts
⚠️ Severity & triage
🎯 Escalation
📖 Playbooks
📢 Communications
💾 Recovery
🔍 Post-incident review
🔄 Plan maintenance
🍺 Buy me a beer